New Mainframe Has Been Unveiled By IBM For Security Purpose
Image Source: zdnet.com"Z13s" Mainframe Has Been Unveiled By IBM For Security PurposeA new version of Z13 mainframe has been unveiled by IBM for mid-sized enterprises that contain many new security...
View ArticleRuby-Nmap: Nmap Exploration Tool And Security/Port Scanner
Ruby-Nmap: Nmap Exploration Tool And Security/Port ScannerDefinition: It is a ruby version library of Nmap, the exploration tool and security/port scanner.Features of ruby-nmap:ruby-nmap is written in...
View ArticleLatest Malvertising Campaigns Hit Skype
Latest Malvertising Campaigns Hit SkypeAccording to the Malvertising compaigns it has been showed that non-browsed-based applications are also vulnerable and can be hit & targeted by any...
View ArticleCatastrophic – A Bug That Could Make Hundreds Of Thousands Devices Vulnerable
Catastrophic – A Bug That Could Make Hundreds Of Thousands Devices Vulnerable.Google’s experts have found defects in using code that can be victimized by allowing to remotely accessible devices just...
View ArticleApple And Government Official Are Battling Over The iPhone 5C Security
Apple And Government Official Are Battling Over The iPhone 5C Security This week Apple is going to face a big test to its iPhone security. Apple is ordered by the Federal judge to assist the FBI...
View ArticleGlibc Vulnerability Is Difficult To Exploit, Says Google Engineers
Glibc Vulnerability Is Difficult To Exploit, Says Google EngineersThe glibc vulnerability which has been discovered by the engineers of Google. They say that exploiting it is very difficult, but there...
View ArticleRetter That Can Easily Promote And Develop Cryptography
Retter That Can Easily Promote And Develop CryptographyRetter is a collection of libraries, hash functions, materials related to cryptography & security, tools and ciphers.Why Retter?The main...
View ArticleDumpDecrypted Provide Better Solution Than GDB Scripts
DumpDecrypted Provide Better Solution Than GDB ScriptsDumpDecrypted is an iPhone Applications to a file. The DumpDecrypted provide better solution as compared to the GDB scripts for non working GDB...
View ArticleFFmpeg 2.8.5 Version Has Been Released
FFmpeg 2.8.5 Version Has Been Released Recently the development team of FFmpeg multimedia backend team has announced that the FFmpeg version 2.8.5 has been released. The FFmpeg multimedia backend is...
View ArticleJohn McAfee Offers To FBI For Decryption The iPhone Free
McAfee Resolves The Problem Of FBI Through Decrypting The iPhone So Apple Doesn’t Have TooIn this week, the news were move all around the single iPhone because it belonged to the event of the...
View Article10,000 Twitter Users Affected By Password Recovery Bug
Image Source: ibnlive.com10,000 Twitter Users Affected By Password Recovery Bug Twitter confirmed that it has patched a problem by known as a “password recovery bug.” You know what due to this problem...
View ArticleWindows 10' Edge Browser Targeted By The Gozi Banking Trojan
Image Source: securityintelligence.comWindows 10's Edge Browser Targeted By The Gozi Banking TrojanGozi Banking Trojan targeted the Windows 10's Edge browser. It has been modified and updated to inject...
View ArticleEven After Patching, Attackers Found A Different Way To Exploit eBay Users
Even After Patching, Attackers Found A Different Way To Exploit eBay Users Two weeks ago, the Cybersecurity firm Checkpoint has discovered the JSF*** XSS bug. Now JSF*** XSS bug is being used in...
View ArticleLinux Mint Website Hacked And Edited To Malicious ISO
Linux Mint Website Hacked And Edited To Malicious ISO Just a few hours ago, leader of Linux Mint Project, Clement Lefebvre informed that the hackers have hacked the Linux Mint website. Hackers are able...
View ArticleFsmon A Open-Source FileSystem Monitor Tool
Fsmon: A Open-Source FileSystem Monitor ToolFsmon is an open-source FileSystem Monitor Tool. Fsmon tool runs on Android, OSX, iOS and Linux. Fsmon is brought by Sergi Àlvarez at Nowsecure and it was...
View ArticleSoftware To Decrypt HydraCrypt And UmbreCrypt Ransomware Files
Software To Decrypt HydraCrypt And UmbreCrypt Ransomware FilesThis month the researcher team came to know about the two new malware families: HydraCrypt and UmbreCrypt. HydraCrypt and UmbreCrypt are...
View ArticleIntel Security Designs The Mobile Security Solution For Samsung Galaxy S7...
Intel Security Designs The Mobile Security Solution For Samsung Galaxy S7 DevicesThe new Samsung Galaxy S7 come up with a new modification(Mobile security solution). Mobile Security Solution is...
View ArticleA Linux-Based Janky Assembly REPL Tool For x86, amd64, And armv7
A Linux-Based Janky Assembly REPL Tool For x86, amd64, and armv7.Rappel is a janky assembly REPL which works starting it under ptrace, by creating shell ELF, then continuously rewriting/running the...
View ArticleROPInjector: To Convert Shellcode Into ROP
ROPInjector: To Convert Shellcode Into ROPROPInjector is a tool by which any shellcode can be converted into ROP and is written in C(Win32). It only supports 32-bit and the x86 instruction...
View ArticleHackers Steal Information From Russian Bank Employees Via Malware
Hackers Steal Information From Russian Bank Employees Via MalwareFor The Purpose Of Stealing Information The Hackers Delivered Trojan To Making The Targeted To The Employees Of At least 6 Russian Banks...
View Article