Yearly Archives: 2016

/2016

How to Install Linux On Your Android Phone Without Rooting

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Canonical is betting big on its official Ubuntu smartphones and working hard to hit the Convergence right spot. However, if you don’t want to go to the market to buy a phone running a Linux distro and you want to use a version other than Ubuntu Phone, […]

By |February 7th, 2016|Papers|

Opening for Manager – Security Operations Center

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Experience:

8 to 12 years of total experience in Security Domain
Atleast 6 to 8 years of experience in Managing SOC operations.

Job Description:
Head the SOC providing Managed Security Services to customers

Assist the team and manage customers’ security products including Check Point Firewalls, CiscoASAs, Blue Coat Proxy Servers, LogRhythm […]

By |February 1st, 2016|job|

Job Openings for Application Security / Penetration Testing / Security Consultants

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Experience Required :

Minimum 1 year experience in Application Security

Job Description :

Security Brigade is looking for talented Application Security Consultants who will be responsible for security assessments and penetration testing
of application and enterprise environments as well as security research and development of security tools, processes and testing […]

By |February 1st, 2016|job|

10 Best Operating Systems For Ethical Hacking And Penetration Testing

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

It’s time to pause the archaic Windows vs. OS X vs. Linux discussion and switch over to some advanced operating systems dedicated to pen testing and ethical hacking. A security-focused operating system is a hacker’s best friend as it helps them to detect the weaknesses in […]

By |February 1st, 2016|Papers|

Opening for CEH fresher

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

No Of Openings – 2

Experience – 0 – 5 yrs

Job Description
– Intermediate knowledge of security, encryption, phishing and CVE
– Intermediate knowledge of Pen Testing Tools for Cyber Security
– Good English and communication skills
– Ability to operate within a team and follow instructions
– Time Management
– Search for […]

By |January 21st, 2016|job|

Here’s how a cheap webcam can be converted into network backdoor

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

This is how a $30 D-Link webcam can be converted into a backdoor
Researchers at US security firm Vectra Networks have hacked a ‘tiny’ D-Link web camera and demonstrated how it can be abused by cybercriminals and turned into a medium to steal data or for sending additional […]

By |January 18th, 2016|Papers|

How To Find IMEI Number Of Your Phone (Even If It’s Lost)

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

The IMEI number, also known as MEID number, acts your phone’s unique identifier. As no two devices have the same IMEI or MEID number, it becomes the best tool to track lost phones.

This unique number is assigned to every new phone and it’s actually associated with the […]

By |January 17th, 2016|Papers|

Top Ten Simple and Useful Internet Tricks That You May Not Know

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Internet Hack : Top 10 Simple and useful Internet tricks for you
There are some simple keyboard shortcuts which one can use while using Internet and it would help the user to avoid typing a lot and also at certain places the mouse can be completely avoided […]

By |January 14th, 2016|Papers|

Android.Bankosy Trojan Learns To Steal Your One-Time Passwords Sent Through Calls

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

The year 2015 saw an unparalleled increase in the notorious financial trojans. These banking trojans get evolved with time and target the security improvements made by the financial institutions. One-time passwords — one such security measure for banking applications — are being intercepted by an Android […]

By |January 13th, 2016|Papers|

Microsoft Wants To Teach You How To Use Linux With Its New Certification Program

Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

When we first said that Microsoft loves Linux, we were not joking. Microsoft has embraced Linux many times over in the recent times and proved us right. It was absolutely unthinkable few years ago, thanks to former CEO Steve Ballmer who went on to call Linux […]

By |January 13th, 2016|Papers|