Apple Released Security Updates With iOS 9.2 Version
Apple Released Security Updates With 9.2 VersionApple also released updates for iOS, tvOS, OS X, watchOS, Safari, and Xcode and patched many vulnerabilities.Updates available including are:iOS 9.2 for...
View ArticleNew Spy Banking Trojan Telax Found By Security Firm Zscaler
New Spy Banking Trojan Telax Found By Security Firm Zscaler.The attackers are using campaign through social engineering tactics such as offering coupon vouchers and free software applications like...
View ArticleTwitter To Warn Users If Their Account Is Hacked By A Government
Twitter To Warn Users if Their Account is Hacked By A Government.The Micro-blogging service sent emails to users that hackers may be trying to breach phone numbers, email ID and IP addresses.In the...
View ArticleSublist3r Fast Subdomains Enumeration Tool For Penetration Testers
Sublist3r Fast Subdomains Enumeration Tool For Penetration TestersSublist3r is python tool that is designed to enumerate subdomains of websites using search engines. It helps penetration testers and...
View ArticleThe Ultimate Raspberry Pi eBook Bundle (Over $90 Value) Get Free
The Ultimate Raspberry Pi eBook Bundle (Over $90 Value) Get Free!Here's your chance to find new inspiration and to push the boundaries of what you thought was possible with tech.To remind us all that...
View ArticleHack Linux Computer By Hitting The Backspace
Hack Linux Computer By Hitting The Backspace ?Is Linux Really Secure!You can easily crack Linux computer by pressing Backspace 28 times.This Exploit have been found by two security researchers Ismael...
View ArticleUbuntu Patches New Linux Kernel Vulnerabilities Including Raspberry Pi 2
Ubuntu Patches New Linux Kernel Vulnerabilities Including Raspberry Pi 2There are four security issues that found in the Linux kernel packages of Ubuntu 15.10 (Wily Werewolf), Ubuntu 15.04 (Vivid...
View ArticleHexPADS, A Host-based, Performance-counter-based Attack Detection System
HexPADS, A Host-based, Performance-counter-based Attack Detection SystemCurrent systems are under constant attack from many different sources. Both local and remote attackers try to escalate their...
View ArticleNow Yahoo Notifies You of Any Suspected State-Sponsored Attack
Now Yahoo Notifies You of Any Suspected State-Sponsored AttackAfter Facebook and Twitter Yahoo gives the warning that have been tarted by a state-sponsored actor.Company Chief Information Security...
View ArticleEA Server Hit By DDOS Attack
EA Server Hit By DDOS AttackHacking group Phantom Sqad launching the DDOS atack on the XBox Live and PLaystation Network from 24 December to 31st December.EA Server server was down for last three...
View ArticleHow Your Credit Card Could Be Hacked
How Your Credit Card Could Be Hacked ?Researchers Exploit Flaw In Credit Card Security SystemsThe German researchers found, any card data may be easily stolen right off the terminals designed to...
View ArticleAnonymous Claims To Have Smashed ISIS Terror Plot On Italy
Anonymous Claims To Have Smashed ISIS Terror Plot On Italy.Hacktivist Group are working to shut down Social Media accounts and websites of ISIS. Now group launched the video and said,"Anonymous from...
View ArticleOSxLockdown: Apple OS X Tool To Audit For, And Remediate, Security...
OSxLockdown: Apple OS X Tool To Audit For, And Remediate, Security Configuration Settings.osxlockdown was built to audit, and remediate, security configuration settings on OS X 10.11 (El Capitan).This...
View Article#Breaking: Debian Founder Ian Murdock Has Died
#Breaking: Debian GNU/Linux Founder Ian Murdock has DiedIan Murdock, who was born on 28 April 1973 and died 28 December 2015. He was an American software engineer, known for being the founder of the...
View ArticleFlare-dbg To Aid Malware Reverse Engineers in Rapidly Developing Debugger By...
flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.Installation/setup1. Install the pykd windbg extension from:...
View ArticleTrain Systems Are Vulnerable To Hack: Report
Train Systems Are Vulnerable To Hack: ReportCyber Attackers on Railway Track!The Automated system control the train signals, protection systems, passenger information and entertainment systems. Digital...
View ArticleHTML5 Security Cheat Sheet Free to Download
HTML5 Security Cheat Sheet Free to Download This cheat sheet serves as a guide for implementing HTML5 in a secure fashion.Contents Include:Communication APIsStorage APIsGeolocationWeb WorkersSandboxed...
View ArticleSony Playstation Down Across PS4, PS3 and PS Vita Worldwide
Sony Playstation Down Across PS4, PS3 and PS Vita Worldwide.PSN was down across all platforms and services. Sony has been updated that its services are down on Playstation 4, Playstation 3, Playstation...
View ArticleAnonymous Hacked Thailand Police Websites Over British Murder Case
Anonymous Hacked Thailand Police Websites Over British Murder CaseHacktivist Group Anonymous Hacked 14 police websites of Thailand in protest at the trial of two Myanmar migrant workers sentenced to...
View ArticleAndroid Mobile Penetrating Testing Tool Kali NetHunter 3.0 Released
Kali NetHunter 3.0 ReleasedThe Android Mobile Penetration Testing PlatformThe Kali NetHunter is an Android ROM overlay that includes a robust Mobile Penetration Testing Platform. The overlay includes a...
View Article