Android Trojan Detected On Philips s307 Smartphone In a previous year, so many firmware Trojan for the android phone were identified w... Read more »
- Latest Post
More Headlines
New Banking Malware Fifth Tinba Iteration 'Tinbapore' Found And Flagged
New Banking Malware Fifth Tinba Iteration 'Tinbapore' Found And Flagged. A new and improved banking malware known for it... Read more »
Mac Malware: Researchers Found A Way To Patch Malware
Mac Malware: Researchers Found A Way To Patch Malware. Apple’s OS X has a built-in anti-malware Gatekeeper system whose purpose i... Read more »
BugshotKit: iOS in-app Bug For Developers And Testers
BugshotKit: iOS in-app Bug For Developers And Testers Marco Arment, made this app for developers to annotate screenshots. And he ... Read more »
A Bug That Can Leak Private Cryptographic Keys Has Been Fixed In OpenSSH
A Bug That Can Leak Private Cryptographic Keys Has Been Fixed In OpenSSH OpenSSH is the widely used implementations of the SSH(S... Read more »
Inexpensive Webcams Easily Turned Into A Network Backdoor
Inexpensive Webcams Easily Turned Into A Network Backdoor According to the researchers, we can easily turn webcam connected device... Read more »
Ring Video Doorbell: Pen Test Partners Found A Serious Flaw For Hackers
Ring Video Doorbell: Pen Test Partners Found A Serious Flaw For Hackers According to PTP team of testers Ring has already ... Read more »
Android Bankosy: A Malware That Uses Call Forwarding To Intercept Voice Calls
Android Bankosy: A Malware That Uses Call Forwarding To Intercept Voice Calls Online theft has been increased tremendously in t... Read more »
Ransomware: A Badly-Coded New Malware That Can Destroy Your Files
Ransomware: A Badly-Coded New Malware That Can Destroy Your Files A malware that restricts the users to access the infected com... Read more »
Malware "Tyupkin” : New Invention Of Cyber Criminals For Accomplishing ATM Attacks
Malware "Tyupkin” : New Invention Of Cyber Criminals For Accomplishing ATM Attacks Over the last few years we have seen so ... Read more »
Zero-Day Danger: A Survey of Zero-Day Attacks and What They Say
Zero-Day Danger: A Survey of Zero-Day Attacks and What They Say Zero-day attacks are targeting software vulnerabilities, and this whi... Read more »
Train Systems Are Vulnerable To Hack: Report
Train Systems Are Vulnerable To Hack: Report Cyber Attackers on Railway Track! The Automated system controls the train signals, p... Read more »
How Your Credit Card Could Be Hacked
How Your Credit Card Could Be Hacked ? Researchers Exploit Flaw In Credit Card Security Systems The German researchers found, any c... Read more »
Hack Linux Computer By Hitting The Backspace
Hack Linux Computer By Hitting The Backspace ? Is Linux Really Secure! You can easily crack Linux computer by pressing Backspace 28 ... Read more »
Security Researchers Get Paid $100K in Bug Bounty Program By Google, Chrome Updated
Security Researchers Get Paid $100K in Bug Bounty Program By Google, Chrome Updated. Google Chrome updated to new 47.0.2526.73 version... Read more »
Another Zero Day Vulnerability Found In Adobe Flash
Another "Zero Day" Vulnerability Found In Adobe Flash The researchers of TrendMicro found Zero day exploit in Adobe Flash Pl... Read more »
Twittor A Fully Featured Backdoor That Uses Twitter As Command And Control Server
Twittor: A Fully Featured Backdoor That Uses Twitter As Command And Control Server.. A stealthy Python based backdoor that uses Twitte... Read more »