Pakistani Cyber Criminals Targeting Indian Military Personnel In Data Theft...
Pakistani Cyber Criminals Targeting Indian Military Personnel In Data Theft Campaign.A group of Cyber Attackers of Pakistan were making target to the Indian Military Force for stealing their personnel...
View ArticleCryptolocker A Trojan Ransomware, Popularity Known As "Police Virus"
Cryptolocker A Trojan Ransomware, Popularity Known As "Police Virus".CryptoLocker is the most prevalent ransomware of all time, which is exclusively built to infect the Windows installed machines. It...
View ArticleHackers Spreading Locky Ransomware Virus Through Social Engineering Hoaxes
Hackers Spreading Locky Ransomware Virus Through Social Engineering Hoaxes.It is considered as the most tactical ransomware ever created. The reason behind this is the method of spreading. The...
View Article1.5 Million Verizon Customers Data Have been Breached, Goes up For Sale
1.5 Million Verizon Customers Data Have been Breached, Goes up For SaleAccording to a Krebs security report, recently a thread has posted on an advertised of cyber crime forums that consists the...
View ArticleTeslaCrypt Ransomware Could Infect Your Hard Drives
TeslaCrypt Ransomware Could Infect Your Hard DrivesA new Ransomware dubbed “Teslacrypt” had been exclusively for PC Game addicts. As this Ransomware centrally concentrates to infect the Games, upon the...
View ArticleLocky Ransomware: A New Danger Comes Up In The Cyber Era
Locky Ransomware: A New Danger Comes Up In The Cyber Era“Your Data could be inaccessible to you unless you pay”. Yes, you heard it right.A new kind of malware has arrived and that is known as...
View ArticleGoogle Boost Gmail Security Through Encryption
Gmail Security Becomes More Secure By Receiving Big Boost By Google.Google is continuously increasing its security as well as protections for Gmail users such as – by giving a noticeable warning to the...
View Article18 Million Stolen Login Credentials Found In A Japanese Company’s Server
18 Million Stolen Login Credentials Found In A Japanese Company’s ServerThe stolen usernames, as well as passwords of up to 18 million internet users, have been identified on a server that is owned by...
View ArticleReDox A Unix Like Operating System Design To Be Secure
Redox is an operating system written in pure Rust, designed to be modular and secure. Redox is a Unix-like Operating System written in Rust. It's aiming to bring the innovations of Rust to a modern...
View ArticleEthereum: A New Rival Virtual Currency Of Bitcoin
Ethereum: A New Rival Virtual Currency Of BitcoinRecently there is a new rush of gold is in underway. Even the Bitcoin has also struggled in value but the value of the new rival virtual currency that...
View ArticleExploitable Flaw In TrueCaller App Found By Security Researchers
Exploitable Flaw In TrueCaller App Found By Security ResearchersThe security researchers of Cheetah Mobile Security Research Lab have discovered an exploitable flaw in the Truecaller app that can...
View ArticleAttention: Locky Ransomware Is Still Hitting Schools, Hospitals and Companies
Beware: Locky Ransomware is still threatening Schools, Hospitals and CompaniesYes, it is very sad to say that this ransomware is still hitting schools, hospitals, companies and other public...
View ArticleShocker: A Tool To Find And Exploit Servers Vulnerable To Shellshock
Shocker: A Tool To Find And Exploit Servers Vulnerable To ShellshockA tool to find and exploit servers vulnerable to Shellshock.usage: shocker.py-h, --help show this help message and exit--Host HOST,...
View Article"Rollout" Patching Tool Became Problem For iOS App Developers
Hackers Abused The iOS App Patching Tool "Rollout" ProneOne more hot-patching solution for iOS applications have analyzed by researchers at security firm FireEye. And also, this solution is abused by...
View ArticleMalicious Chrome Extension Can Hijack Your Browser
Users Reported About The Hijacking Of Chrome ExtensionWhen users reported that the Better History Chrome extension started taking over their browsing experience and redirecting them to pages showing...
View ArticleBug In Apple Siri Allowed To Access Your Contacts And Photos
Bug In Apple Siri Allowed To Access Your Contacts And PhotosTo overcome the annoying activation lock bug found in iOS 9.3 , the latest version of Apple’s mobile operating system has been released...
View ArticleGoogle Fixes 8 Critical Android Bugs
Google Fixes 8 Critical Android BugsOn Monday, Google announced that it initiated rolling out the monthly Android security update for its Nexus range of devices. And also, the company said that the...
View ArticleHacking Team Lost Its Export License To Sell Surveillance Software To Outside...
Hacking Team Lost Its Export License To Sell Surveillance Software To Outside EuropeItaly's GD for International Trade Policy has revoked the Hacking Team's export license, which stops the company from...
View ArticleTurkey Starts Investigation On Their 50 Million Citizens Data Leaked
Turkey Starts Investigation On Their 50 Million Citizens Data LeakedTurkey is investigation that how hackers have posted online important information of about some 50 million Turkey’s people. Even it...
View ArticleEhTrace- A Tool For Tracing Execution of Binaries On Windows
Eh-Trace (pronounced ATrace) is a binary tracing tool for Windows. ATrace is a tool for tracing execution of binaries on Windows.Implemented in C but has some interesting properties that may make it...
View Article