Hackers Can Use Your HeadPhones For Spy On You The Security researchers of Israel found new Malware known Speake(a)r that converts... Read more »
- Latest Post
More Headlines
VolatilityBot – An Automated Memory Analyzer For Malware Samples And Memory Dumps
VolatilityBot – An Automated Memory Analyzer For Malware Samples And Memory Dumps VolatilityBot is an automation tool for researcher... Read more »
A Simple Static Malware Analyzer SSMA Tool Written in Python 3
SSMA is a simple malware analyzer written in Python 3. Features: Analyze PE file’s header and sections (number of sections, entr... Read more »
CryLocker Ransomware Gather Victim Wi-Fi Network Information And Location On Google Map
CryLocker Ransomware Gather Victim Wi-Fi Network Information And Location On Google Map. Over 10,000 Users Infected from CryL... Read more »
LuaBot First Botnet Malware To Target Linux Platforms
View the binary's ASCII in the last part and you'll see the first email address | Credit: MalwareMustDie Researchers Finds ... Read more »
How This Trick Can Hijack Your Chrome Browsers
How This Trick Can Hijack Your Chrome Browsers. Tech support scammers using Social engineering technique and show fake Google UI Tool... Read more »
CuckooDroid - Automated Android Malware Analysis Tool
CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox. CuckooDroid is an extension of Cuckoo Sandbox the Open Source... Read more »
HEIST Attack On HTTPS Websites Can Steals Your Private Data
HEIST Attack On HTTPS Websites Can Steals Your Private Data Two Security researchers Mathy Vanhoef and Tom Van Goethem explained the... Read more »
MARA: A Mobile Application Reverse Engineering and Analysis Framework Tool
MARA: A Mobile Application Reverse Engineering And Analysis Framework Tool MARA is a Mobile Application Reverse engineering and Anal... Read more »
Mostly AD Malware Campaigns Are Running For Fraudulent Revenue Generation From China
Mostly AD Malware Campaigns Are Running For Fraudulent Revenue Generation From China According to study , Yingmob runs Chinese adve... Read more »
Stuxnet: One of the Most Dangerous Cyber Weapons Ever Created
Stuxnet: One of the Most Dangerous Cyber Weapons Ever Created Stuxnet is a computer worm which is specifically designed to attack embedded... Read more »
Turn Your PC Into A Web Proxy By Windows Trojan Using TeamViewer
Turn Your PC Into A Web Proxy By Windows Trojan Using TeamViewer. BackDoor.TeamViewer.49 is the name of a backdoor trojan which is... Read more »
Santoku: Mobile Forensics, Malware Analysis And App Security Testing
Santoku: Mobile Forensics, Malware Analysis, and App Security Testing Santoku is an open-source platform that is also very simple ... Read more »
You May Get Hacked By Charging Your Phone Through A Computer
You May Get Hacked By Charging Your Phone Through A Computer If you connect your mobile device to a computer by using a USB ca... Read more »
Ke3chang Malware Targeting Indian Embassies Officials Again
Ke3chang Malware Targeting Indian Embassies Officials Again A group of cyber-espionage handshake with China as well as it is calle... Read more »
Study Revealed – Brazilian Companies Rank Worst Among Other Companies In Terms of Cyber Security
Study Revealed – Brazilian Companies Rank Worst Among Other Companies In Terms of Cyber Security According to a disclosed ... Read more »
Should You Use an Online Web Security Scanning Service or a Desktop Vulnerability Scanner?
Should You Use an Online Web Security Scanning Service or a Desktop Vulnerability Scanner? Chances are, you’re well aware of the fact tha... Read more »
CyberAttackers Are Targeting The Middle East Banks Through Malicious Excel Files
CyberAttackers Are Targeting The Middle East Banks Through Malicious Excel Files The FireEye which is a US security firm disclos... Read more »
Many Ubiquiti AirOS Routers Are On Under Worm Attack
Many Ubiquiti AirOS Routers Are On Under Worm Attack. According to an “urgent” warning posted by the company on a user forum tha... Read more »