Today, I got a news from one of my stuff tat, Some Security Researchers from Myanmar are comming out, ya!. Named themselves “MyanmarCyberSecurityTeam or MCST“, WoW! So many hackers (Black | White). I don’t know what going on with those guys but I like da action and activities of this MCST for Researching and Pointing security weakness of Myanmar IT Development in Software/Hardware and Network. I glad to heard and hope that they’ll always keep their good sakes forever.

As for my I don’t want any new generations are going on with the wrong ways…
We research for test and penetrate,
We suggest them to fix their security weakness as soon as possible,
We share our knowledge with everybody..

WE ARE SMALL, BUT TOGETHER WE ARE BIG!

Explore More

What are worms?

Worms are programs that replicate themselves from one system to another without using a host file. Although in most cases worms exist inside files, such as Word or Excel documents,

WikiLeaks founder Julian Assange was refused bail by a British court on Tuesday after he was arrested over allegations of sex crimes in Sweden.

(Reuters) Assange, whose WikiLeaks website is at the center of a row over the release of secret U.S. diplomatic cables, was arrested under a European Arrest Warrant earlier on Tuesday

Password stealing using fake login page

It’s quite easy to construct a bogus login page and steal password. Let’s look at the methods used to construct a fake login screen and how hackers steal your password.