Could Your Bad Password Habits Come Back To Haunt You?

According to Business Insider, the CEO of a major social network used its trusted database of user passwords in order to hack into one of its user’s email accounts. The hack was based on the guess that this user probably accessed all of their accounts using the same password. Although the cloud has provided us […]

Introduction to Web Application Firewall (WAF) ~ Website Security

What is WAF?WAF is expanded as Web Application Firewall. WAF is server side application that controls the input and output(filter the HTTP communication).  It controls network traffic on any OSI Layer up to Application Layer.  The main purpose of WAF is to provide better protection over the top Wep Application vulnerability such as XSS(Cross Site Scripting), SQL […]

How to Stay Anonymous on the Internet Using Tor ? #Security Tips

Why you should hide yourself?Internet is risky place to surf, here your privacy is not secure as you think.  Others can track what you are searching or what is your interest(Based on that , scammers can scam you).  Some websites store your real IP. An attacker can get the IP from the website by attacking […]

How to recover a Hacked or Compromised Gmail Account?~Security Tips

Now a days, hacking gmail account is increasing.  Most of people doesn’t know how to be secure(because they doesn’t visit BreakTheSecurity).  So please refer our website to your friends as Security tips Blog. Ok let me come to the point.  In this article, i will explain how to recover your hacked or compromised gmail accounts. […]

How to Disable Social Networks from tracking you ? ~Privacy Tips

I hope you read the Facebook privacy risk news. Did you know that social networking sites like Facebook, Google+, and Twitter can track your visits to any web page that uses the familiar “Like”, “Follow”, or “+1” buttons, even if you do not actually click these buttons? Here i am going to introduce a new […]

Bikini-clad women and photo tags | Facebook scammers

I have explained about Facebook scamming in my previous posts.  Still people believe that “Facebook will provide Facebook visitors tracker”.  If you believe also, please read this article.  This is not only for Facebook users but also for twitter users. A new Facebook is spreading over the Facebook.  Attacker tag your name in some hot women photos, it will probably displayed in your notifications. You […]

10 ways to Handle problems yourself instead of System Administrator-Organization Tips

When you are working in organisation , you may need system administrator to solve the some of your problems.  Don’t call System Administrator for your simple silly mistakes.  Try to solve yourself and reduce the work load of System Administrator.  Here is the list of top 10  tips to solve the problems yourself. Organisation Tips […]

How to Prevent SQL Injection Vulnerability? Website Security

Hi webmasters and budding Pen Testers, I hope you read my article about SQL Injection. Our Aim is to provide Security, right? So here is the prevention techniques. Use Prepared Statements: Use prepared statements, parameterized queries, or stored procedures. Don’t use Dynamic SQL. In Java you can use PreparedStatement() with bind variables  In .NET you […]