Cryptokiller: A Tool Designed To Stop And Detect Cryptolocker Malware
Cryptokiller: A Tool Designed To Stop And Detect Cryptolocker MalwareIn recent weeks, users and institutions rather head painful Cryptolocker working on malware, detecting the transmission of...
View Article60+ Malvertised Google Play Store Games Affecting Users Through Steganography
60+ Malvertised Google Play Store Games Affecting Users Through Steganography.On Google’s official Play Store 60 Android games have been discovered by Dr. Web that contains a malicious trojan named...
View ArticleWeeman A HTTP Server for Phishing
Weeman – A HTTP Server for PhishingWeeman is a HTTP server for phishing in python. Weeman has support for most of the (biggest) websites. Usually you will want run Weeman with DNS spoof attack. (see...
View ArticlePyKeylogger A Pure-Python Keylogger For Linux
PyKeylogger: A Pure-Python Keylogger For LinuxDefinition: PyKeylogger is a pure-python keylogger for Linux that uses Xlib by which it can monitor the state of the keyboard. The main purpose is backup...
View ArticleWhatportis: A Command To Search Port Names And Numbers
Whatportis: A Command To Search Port Names And NumbersIt often happens that we need to find the default port number for a specific service, or what service is listening on a given port.UsageThis tool...
View Article250GB DATA Got Hacked From NASA Drone
250GB DATA Got Hacked From NASA DroneA couple of days ago it was reported that a hacker hacked the NASA server and leaked a lot of data which became the cause of unimaginable damage to the...
View ArticleSelf-Driving Cars Could Face Threat From Hacker
Self-Driving Cars Could Face Threat From HackerAs we all know that the major auto companies are working on futuristic self-driving technology in cars very soon, and this project is more popular between...
View ArticleWindows 10 Along With Chrome Having Best Security Features
Windows 10 Along With Chrome Having Best Security FeaturesAs per all versions of Window, we are encountering problems with the security reasons, but now the Windows 10 November update (version 1511,...
View ArticleDell's BIOS Verification Technology Protects From BOOT Attacks
Dell's BIOS Verification Technology Protects From BOOT AttacksNumber of ways has been provided by the Intel and PC makers in order to protect computer BIOS, and all reside within computer system. Now...
View ArticleA Security Software Product "AVAST" Having A Flaw
A Security Software Product "AVAST" Having A FlawAn open-source Chromium browser has been taken up by so many antivirus vendors. And they always claim that they are more secure and privacy-friendly...
View ArticleAndroid Dynamic Binary Instrumentation (ADBI) Tool
Android Dynamic Binary Instrumentation (ADBI) Tool.Tool for dynamically tracing Android native layer. Simple binary instrumentation toolkit for Android ARM + Thumb.Using this tool you can insert...
View Article20M Account Of Alibaba's E-commerce Website Taobao Hacked
20M Account Of Alibaba's E-commerce Website Taobao Hacked. A state media report that is posted on the internet regulator's website said that "More than 20M active accounts has been hacked by the...
View ArticleSecurity Researcher Found A 'Severe' Vulnerability in eBay
Security Researcher Found A 'Severe' Vulnerability in eBayA "severe" vulnerability exists in eBay for which they have no plans to patching it. Check Point Software firm Researchers said that "a...
View ArticleResearchers Found New Malware "T9000" That Allow To Steal Files And Record...
Researchers Found New Malware "T9000" That Allow To Steal Files And Record Skype Conversations.A well-equipped new Trojan came that contained many features by which it can easily steal any files, can...
View ArticleCyber Attack On Indian Revenue Service Official Website Hacked By Pakistani...
Cyber Attack On Indian Revenue Service Official Website, Hacked By Pakistani Hackers.Messages like “Pakistan Zindabad” and “Feel the power of Pakistan, Indian gov website Pwned (sic)” are the messages...
View ArticleiPhone 6 'Error 53' Message Is To Protect Customer Security Says Apple
iPhone 6 'Error 53' Message Is To Protect Customer Security Says Apple.Nowadays Apple is in the controversies of its "Error 53" message on iPhones. According to them, it protects customer's security....
View ArticleArachni A Framework Of Web Application Security Scanner
Arachni: A Framework Of Web App Security ScannerDefinition: Arachni is a framework of web application security scanner. The main goal is to help penetration testers and administrators.Components:It has...
View ArticleFacebook Awarded $3500 Bug Bounty For Finding Vulnerability on Event Cover Page
Facebook Awarded $3500 Bug Bounty For Finding Vulnerability on Event Cover PageSecurity researcher 'Roy Castillo' discovered the vulnerability. He told HackersOnlineClub that this Vulnerability was...
View ArticleOracle Fixes Java Installer Vulnerability
Oracle Fixes Java Installer VulnerabilityIn order to address a high severity vulnerability, Oracle released new updates for Java 6, 7 and 8 that can easily be exploited by a unauthenticated attacker...
View ArticleHackers Leaked 20,000 FBI And 9,000 DHS Employees Data
Hackers Leaked 20,000 FBI And 9,000 DHS Employees DataAccording to a survey of Motherboard, they found that a hacker wants or makes a plan to leak the information of FBI employees as well as declared...
View Article