Exitmap : Exposing Malicious Tor Exit Relays.
Exitmap : Exposing Malicious Tor Exit Relays.

Tor is a  free software and an open network that helps you defend against traffic analysis, a form of network surveillance that thre...

Read more »

PayPal Critical Vulnerability To Steal User's Credit Cards in Clear Text Format
PayPal Critical Vulnerability To Steal User's Credit Cards in Clear Text Format

Image credits: PayPal.com A critical security vulnerability has been discovered in the eBay-owned PayPal that could allow attackers ...

Read more »

Hacking Gmail With Fridge : Samsung smart fridge leaves Gmail logins vulnerable to attack
Hacking Gmail With Fridge : Samsung smart fridge leaves Gmail logins vulnerable to attack

Image courtesy: slate.com Security researchers have discovered an exploit that could potentially steal Gmail credentials of a user wh...

Read more »

Task Hijacking Attack: Another Dreaded Android Vulnerability
Task Hijacking Attack: Another Dreaded Android Vulnerability

It's really hard time for Android, as yet another serious vulnerability was discovered recently. The issue resides in the multitas...

Read more »

Using Deprecated RIPv1 Routing Protocol for Reflection DDoS Attacks
Using Deprecated RIPv1 Routing Protocol for Reflection DDoS Attacks

Image credits: Prolexic Security Engineering and Research Team RIPv1 Protocol RIPv1, the short form of routing Information prot...

Read more »

Car Hacking : Megamos Crypto Transponder Vulnerability.
Car Hacking : Megamos Crypto Transponder Vulnerability.

Car hacking ain't new anymore, we've seen the demonstration by Charlie Miller and Chris Valasek on hacking an internet conne...

Read more »

Hacking Android Pattern Lock (ALP)
Hacking Android Pattern Lock (ALP)

Android pattern lock is the password alternative Google introduced in 2008 with the launch of its Android mobile OS. New studies show t...

Read more »

Circuit Fingerprinting-Unmasking Tor Users without Decrypting Traffic.
Circuit Fingerprinting-Unmasking Tor Users without Decrypting Traffic.

Image source :  https://people.csail.mit.edu/devadas/pubs/circuit_finger.pdf Well.., Looks like the reliability of Tor Is Peeling of...

Read more »

The Quantum Cryptography System: Uncrackable encryption.
The Quantum Cryptography System: Uncrackable encryption.

Absolutely Unbreakable Encryption Japanese tech giant Toshiba is all set to create the next level of encryption technology that the f...

Read more »

Vulnerability In BitTorrent Can Be Exploited For DDoS Attacks
Vulnerability In BitTorrent Can Be Exploited For DDoS Attacks

The BitTorrent protocol is a file-sharing protocol used by Millions of online users to exchange files over the Internet on a daily bas...

Read more »

Firefox stealthily loads webpages arising Privacy & Security concerns.
Firefox stealthily loads webpages arising Privacy & Security concerns.

Image courtesy: geeky-gadgets.com Many browsers do pre-fetching and caching of web pages for speed and performance optimization. But ...

Read more »

Hackers Can Attack Gas Stations and Blow It Up.
Hackers Can Attack Gas Stations and Blow It Up.

Anything can be hacked, not just cars, snipers, smartwatches or skateboards. Hackers are attacking anything that is connected to the In...

Read more »

Lenovo Caught Installing Rootkits In Their PCs !
Lenovo Caught Installing Rootkits In Their PCs !

One of the most popular Chinese computer manufacturers ‘Lenovo’ has been caught once again using a hidden Windows feature to preinsta...

Read more »

Windows Mount Manager Bug - Birth of Next StuxNet ?
Windows Mount Manager Bug - Birth of Next StuxNet ?

Windows Mount Manager Bug Microsoft recently patched a vulnerability in Windows Mount Manager , a driver in mountmgr.sys that assigns d...

Read more »

Bettercap - Advanced MITM tool & Framework
Bettercap - Advanced MITM tool & Framework

What is Bettercap? Bettercap is a complete, modular, portable and easily extensible MITM tool and framework with every kind of diag...

Read more »

StageFright: Worst Android RCE Bug ever
StageFright: Worst Android RCE Bug ever

Android Remote Code Execution Vulnerability This RCE bug was found to affect almost all versions of android, right from the 2.2 to 5...

Read more »

HORNET: Ultra High Speed & Secure TOR Alternative
HORNET: Ultra High Speed & Secure TOR Alternative

Tor network alternative For many years until now, userTor has been the favorite option to maintain anonymity on the Internet. Tor was...

Read more »

R.I.P Adobe Flash. Final Nail in The Coffin By Google.
R.I.P Adobe Flash. Final Nail in The Coffin By Google.

Google to kill Adobe Flash  Adobe flash has been sentenced to death by most of the applications and platforms and now it seems to ...

Read more »

Hacking Team Data Breach-Overview Of Leaked data
Hacking Team Data Breach-Overview Of Leaked data

Hacking Team got Hacked! Hacking Team is an Italian company that sells intrusion and surveillance tools to governments and law enforcem...

Read more »
 
Top