ANDROID ADDRESS BAR SPOOFING DUE TO OMNIBOX

AHMED MEHTAB 3:18 PM ADD COMMENT
Abstract A study shows that more than 1.2 billion people use their mobile phones for browsing over the internet which is increasing …
Infinix Sending Data To China Suspected Backdoor Found in Analysis
INFINIX SENDING DATA TO CHINA SUSPECTED BACKDOOR FOUND IN ANALYSIS
AHMED MEHTAB 7:28 AM ADD COMMENT
There is no doubt Infinix mobile phone’s are rocking in the market because of their cheap rate’s but when it come’s to securi…
Gmail Account Hijacking Vulnerability | Ahmed Mehtab
GMAIL ACCOUNT HIJACKING VULNERABILITY | AHMED MEHTAB
AHMED MEHTAB 5:58 PM 5 COMMENTS
Introduction Gmail allows its users from all over the world to use multiple email addresses and associat…
How dangerous it could be if your Gmail Account is Hacked ?
HOW DANGEROUS IT COULD BE IF YOUR GMAIL ACCOUNT IS HACKED ?
AHMED MEHTAB 6:36 AM 1 COMMENT
Gmail one of the top email service provider also known as Google Mail , Our today topic is how dangerous could be your gmail account if H…
How to find IP Address behind Cloudflare
HOW TO FIND IP ADDRESS BEHIND CLOUDFLARE
AHMED MEHTAB 5:49 AM 2 COMMENTS
CloudFlare one of the most popular firewall mostly used for protecting servers and web applications from DDOS attacks and to improv…
Cyber Security Training In Pakistan – Become a Pentester from your home
CYBER SECURITY TRAINING IN PAKISTAN – BECOME A PENTESTER FROM YOUR HOME
AHMED MEHTAB 9:31 AM 3 COMMENTS
When we talk about Information Technology , Security matters. worlds leading Multi-National companies like Microsoft , Sony , Google an…
Defusing The Virus – Hack The Hacker
DEFUSING THE VIRUS – HACK THE HACKER
AHMED MEHTAB 2:59 PM 2 COMMENTS
VIRUS a piece of malicious coded file can turn your life into hell , Worlds first PC virus was created in Pakistan , Lahore by two broth…
Omni RAT which can turn your android phone into a hacking machine
OMNI RAT WHICH CAN TURN YOUR ANDROID PHONE INTO A HACKING MACHINE
AHMED MEHTAB 7:07 AM 2 COMMENTS
RAT ( Remote Administration Tool ) was designed to control and monitor activities of users likely for parents to monitor the activity of the…
RAFAY BALOCH’S AMAZING BOOK ON PENETRATION TESTING
AHMED MEHTAB 5:15 AM 1 COMMENT
According to a report published on forbes more than 30,000 websites are hacked per day. Life is changing and security matters , if you w…
How Hackers Are Massively Targeting Companies via Email Miss-configuration
HOW HACKERS ARE MASSIVELY TARGETING COMPANIES VIA EMAIL MISS-CONFIGURATION
AHMED MEHTAB 10:42 PM 3 COMMENTS
Its me Ahmed Mehtab and today on the behalf of Security Fuse i would like share a proof of concept on Security Miss-configuration discov…
Facebook
Twitter
Google+
Pinterest
RSS
Subscribe Now
Your Email
POPULAR POSTS
Gmail Account Hijacking Vulnerability | Ahmed Mehtab
GMAIL ACCOUNT HIJACKING VULNERABILITY | AHMED MEHTAB
Introduction Gmail allows its users from all over the world to use multiple email addresses and associat…
Decrypt handshake using crunch – Kali Linux
DECRYPT HANDSHAKE USING CRUNCH – KALI LINUX
Handshake Decryption Today you will learn How to decrypt WEP / WPA / WPA2 handshake which you captured in a .cap file indeed the bes…
How to capture WiFi Handshake in Kali Linux
HOW TO CAPTURE WIFI HANDSHAKE IN KALI LINUX
Handshake is usually a term used to describe the transfer of confidential information between a computer or a device where there is a …
WiFi Phishing Tutorial – Kali Linux
WIFI PHISHING TUTORIAL – KALI LINUX
wifi phishing WiFi Phishing , art of social Engineering. Many people are aware of ” Phishing Attack ” which in terms com…
How to find IP Address behind Cloudflare
HOW TO FIND IP ADDRESS BEHIND CLOUDFLARE
CloudFlare one of the most popular firewall mostly used for protecting servers and web applications from DDOS attacks and to improv…
How dangerous it could be if your Gmail Account is Hacked ?
HOW DANGEROUS IT COULD BE IF YOUR GMAIL ACCOUNT IS HACKED ?
Gmail one of the top email service provider also known as Google Mail , Our today topic is how dangerous could be your gmail account if H…
Infinix Sending Data To China Suspected Backdoor Found in Analysis
INFINIX SENDING DATA TO CHINA SUSPECTED BACKDOOR FOUND IN ANALYSIS
There is no doubt Infinix mobile phone’s are rocking in the market because of their cheap rate’s but when it come’s to securi…
Scan website vulnerabilities with UNIscan – kali linux
SCAN WEBSITE VULNERABILITIES WITH UNISCAN – KALI LINUX
uniscan UNISCAN a popular linux based tool for scanning vulnerabilities in website or web application running on server. Security Pent…
Omni RAT which can turn your android phone into a hacking machine
OMNI RAT WHICH CAN TURN YOUR ANDROID PHONE INTO A HACKING MACHINE
RAT ( Remote Administration Tool ) was designed to control and monitor activities of users likely for parents to monitor the activity of the…
Cyber Security Training In Pakistan – Become a Pentester from your home
CYBER SECURITY TRAINING IN PAKISTAN – BECOME A PENTESTER FROM YOUR HOME
When we talk about Information Technology , Security matters. worlds leading Multi-National companies like Microsoft , Sony , Google an…
ABOUT US

Security Fuse specilizes in cyber security , we aim to help organizations and indivisuals to get secured either by our consultancy or via our publications. We have trained over hundereds of students and helped thousands through our publication.

Our blog is responsible for providing cyber security and research based articles which will help you learn and sharp your skills. We accept articles related to cyber security , if you are interested to know more about us or to submit an article please visit contact us.