$38 Million Is Needed By FBI To Break The Encryption "Whenever we encounter encryption during any of the investigation, that... Read more »
- Latest Post
More Headlines
A Trojan To Easily Manipulate Ruble-Dollar Exchange Rate
A Trojan To Easily Manipulate Ruble-Dollar Exchange Rate A new Trojan came which can easily manipulate the rubles-dollar exch... Read more »
Researchers Found New Malware "T9000" That Allow To Steal Files And Record Skype Conversations.
Researchers Found New Malware "T9000" That Allow To Steal Files And Record Skype Conversations. A well-equipped new Tro... Read more »
LeChiffre: A Ransomware That Hits Three Indian Banks
LeChiffre: A Ransomware That Hits Three Indian Banks LeChiffre: A ransomware which can easily invades your computer silently and c... Read more »
Zero-Day Linux Kernel Vulnerability Gives Attacker Root Access
Zero-Day Linux Kernel Vulnerability Gives Attacker Root Access The OS having Linux Kernel 3.8 and the versions which released afte... Read more »
Russian Hackers Try To Sabotage Boryspil, Ukraine's Largest Airport
Russian Hackers Try To Sabotage Boryspil, Ukraine's Largest Airport Boryspil International Airport: The international Airport in Bory... Read more »
MegalodonHTTP: Suspect Of The DDos Malware Arrested
MegalodonHTTP: Suspect Of The DDos Malware Arrested MegalodonHTTP, is a malware that includes a back door for administrative c... Read more »
Inexpensive Webcams Easily Turned Into A Network Backdoor
Inexpensive Webcams Easily Turned Into A Network Backdoor According to the researchers, we can easily turn webcam connected device... Read more »
Ransomware: A Badly-Coded New Malware That Can Destroy Your Files
Ransomware: A Badly-Coded New Malware That Can Destroy Your Files A malware that restricts the users to access the infected com... Read more »
Malware "Tyupkin” : New Invention Of Cyber Criminals For Accomplishing ATM Attacks
Malware "Tyupkin” : New Invention Of Cyber Criminals For Accomplishing ATM Attacks Over the last few years we have seen so ... Read more »
PyAna - Analyzing the Windows shellcode..
PyAna - Analyzing the Windows shellcode.. Using Unicorn Framework for emulating shellcode. PyAna emulate a process on Windows: PEB, ... Read more »
New Linux Ransomware Website Demand $999 With Bitcoin
New Linux Ransomware Website Demand $999 With Bitcoin Security firms DrWeb and BitDefender have identified three different versions ... Read more »
Tutorial: XSSF In Metasploit
Tutorial: XSSF In Metasploit Hey today I am back with some Metasploit stuff. Here is the XSSF (Cross Site Scripting Framewor... Read more »
13 Million Users Data Breached Of Free Web Hosting Company 000Webhost
13 Million Users Data Leaked With Plain Text Password Of Free Web Hosting Company 000Webhost. 000webhost is providing a free web hosti... Read more »
Another Zero Day Vulnerability Found In Adobe Flash
Another "Zero Day" Vulnerability Found In Adobe Flash The researchers of TrendMicro found Zero day exploit in Adobe Flash Pl... Read more »
Your Chrome Gets Crash By Using These String Code URL
Your Chrome Gets Crash By Using These String Code URL We have tested these 16 characters strings and it still works on Windows and Ma... Read more »
Are You Using WhatsApp Web? Your Account Can Be Hack
Are You Using WhatsApp Web? Your Account Can Be Hack! The major security flaw on WhatsApp web. The company recently announced 900 mi... Read more »
SONAR: A Framework For Identifying And Launching Exploits Against Internal Network Hosts
SONAR: A Framework For Identifying And Launching Exploits Against Internal Network Hosts Works via WebRTC IP scanning combined with ex... Read more »