PyAna - Analyzing the Windows shellcode..
PyAna - Analyzing the Windows shellcode..Using Unicorn Framework for emulating shellcode. PyAna emulate a process on Windows: PEB, TIB, LDR_MODULE to create a emulative environment.UsageFrom...
View ArticleSnowden Says, FBI Can't Arrest A Robot at CES 2016
Snowden Says, FBI Can't Arrest A Robot at CES 2016Snowden's high tech gadget surprises audience who were attending Consumer Electronics Show (CES) featuring at Las Vegas.While appearing on a...
View ArticleZero-Day Danger: A Survey of Zero-Day Attacks and What They Say
Zero-Day Danger: A Survey of Zero-Day Attacks and What They SayZero-day attacks are targeting software vulnerabilities, and this white paper will provide an overview of many of those attacks in the...
View ArticleIntroducing New More Anonymity Tool Called PrivaTegrity
Introducing New Anonymity Tool Called "PrivaTegrity".PrivaTegrity would resolve the issues of TOR, can say alternative of TOR.The Father of Online Anonymity "David Lee Chaum" (born 1955) who is the...
View ArticleMalware "Tyupkin” : New Invention Of Cyber Criminals For Accomplishing ATM...
Malware "Tyupkin” : New Invention Of Cyber Criminals For Accomplishing ATM AttacksOver the last few years we have seen so many crimes regarding the ATM attacks using malicious malware or through any...
View ArticleBlack Hat SEO Campaign: Akamai’s New Campaign Powered By SQL Injection To...
Black Hat SEO Campaign: Akamai’s New Campaign Powered By SQL Injection To Boost Search Rankings.In the middle of the 2015, According to report Akamai identified a sophisticated Black Hat Search Engine...
View ArticleMicrosoft Officially Ends Support For Internet Explorer’s Older Versions 8, 9...
Microsoft Officially Ends Support For Internet Explorer’s Older Versions 8, 9 and 10.As of from Tuesday Microsoft has officially ended support for Internet Explorer version 8, 9 and 10, leaving only...
View ArticleYahoo Lawsuits: Finally Yahoo Agrees To Settle E-mail Privacy Suit
Yahoo Lawsuits: Finally Yahoo Agrees To Settle E-mail Privacy Suit.At last Yahoo Inc. has agreed to settle a class action challenging the way the company analyzes email messages to serve targeted ads...
View ArticleRansomware: A Badly-Coded New Malware That Can Destroy Your Files
Ransomware: A Badly-Coded New Malware That Can Destroy Your FilesA malware that restricts the users to access the infected computer system and demands some amount of ransom that is paid by the user to...
View ArticleAndroid Bankosy: A Malware That Uses Call Forwarding To Intercept Voice Calls
Android Bankosy: A Malware That Uses Call Forwarding To Intercept Voice CallsOnline theft has been increased tremendously in the world. Somewhere it’s related to e-mail, social networking account,...
View ArticleSilverlight Zero-Day Exploit: Hacking Team Breach Helps Kaspersky Lab
Silverlight Zero-Day Exploit: Hacking Team Breach Helps Kaspersky LabZERO-DAY EXPLOIT: It’s an unknown flaw/exploit that exposes a vulnerability in software or hardware and able to create complicated...
View ArticleRing Video Doorbell: Pen Test Partners Found A Serious Flaw For Hackers
Ring Video Doorbell: Pen Test Partners Found A Serious Flaw For HackersAccording to PTP team of testers Ring has already addressed the issue via a firmware update, but it's still interesting to look at...
View ArticleInexpensive Webcams Easily Turned Into A Network Backdoor
Inexpensive Webcams Easily Turned Into A Network BackdoorAccording to the researchers, we can easily turn webcam connected device into a backdoor. A ‘tiny' D-Link web camera and turned it into a...
View ArticleWS-Attacker A Modular Framework For Web Services Penetration Testing
WS-Attacker is a modular framework for web services penetration testing.It is developed by the Chair of Network and Data Security, Ruhr University Bochum (http://nds.rub.de/ ) and the 3curity GmbH...
View ArticleA Bug That Can Leak Private Cryptographic Keys Has Been Fixed In OpenSSH
A Bug That Can Leak Private Cryptographic Keys Has Been Fixed In OpenSSHOpenSSH is the widely used implementations of the SSH(Secure Shell) protocol and a bug was there which possess the ability to...
View ArticleMegalodonHTTP: Suspect Of The DDos Malware Arrested
MegalodonHTTP: Suspect Of The DDos Malware ArrestedMegalodonHTTP, is a malware that includes a back door for administrative control over the target computer and designed to power distributed...
View ArticleBugshotKit: iOS in-app Bug For Developers And Testers
BugshotKit: iOS in-app Bug For Developers And TestersMarco Arment, made this app for developers to annotate screenshots. And he released an open-source embeddable version for iOS developers. It is made...
View ArticleCisco Kills Hardcoded Password In Software Devices
Cisco Kills Hardcoded Password In Software DevicesWi-Fi gear, WLAN controllers, and ISE.Cisco are the wireless devices designed by Cisco with hardcoded passwords. Recently two critical vulnerabilities...
View ArticleSQLmap: A Open-Source Penetration Testing Tool
SQLmap: A Open-Source Penetration Testing ToolDefination: An open source penetration testing tool that perform the process of detecting and exploiting SQL injection flaws and taking over of database...
View ArticleMac Malware: Researchers Found A Way To Patch Malware
Mac Malware: Researchers Found A Way To Patch Malware.Apple’s OS X has a built-in anti-malware Gatekeeper system whose purpose is to protect Macs from cyber attacks from all over the world. In...
View Article