Dnsteal : Data Exfiltration Tool Through DNS Requests
Dnsteal : Data Exfiltration Tool Through DNS Requests

Data exfiltration, also called data extrusion, data exportation, or data theft is the unauthoriz...

Read more »

R.I.P iOS Security! The First major cyber attack on Apple's App Store.
R.I.P iOS Security! The First major cyber attack on Apple's App Store.

Comparing iOS and Android iOS is said to be more secure because applications are fully vetted b...

Read more »

Reflected File Download Vulnerability found In LinkedIn.[Patched Now]
Reflected File Download Vulnerability found In LinkedIn.[Patched Now]

Image courtesy : Pcmag A critical Reflected File Download Vulnerability in LinkedIn was discov...

Read more »

iOS 9 boasts of Improved security but gets hacked before even release!
iOS 9 boasts of Improved security but gets hacked before even release!

On the wake of   iCloud hack and consequent leak of the nude pictures of a number of celebriti...

Read more »

A 1200-Year-Old Hacking Technique Can Crack Most Advanced Encryption Techniques.
A 1200-Year-Old Hacking Technique Can Crack Most Advanced Encryption Techniques.

Image credits:i.ytimg.com Cryptology has its origins among Ancient Arab scholars,where the...

Read more »

Carbanak Trojan Reborn: One Of The Worst Financial APT Strikes Again !
Carbanak Trojan Reborn: One Of The Worst Financial APT Strikes Again !

A new version of the notorious Carbanak Trojan was spotted in the wild targeting financial org...

Read more »

Hacking IoT: Hackers can hijack baby monitors easily.
Hacking IoT: Hackers can hijack baby monitors easily.

Yes,Some bad guys do! Baby Monitors are one of the Internet of Things ( IoT) product  which m...

Read more »

Sleepy Puppy : Advanced XSS Scanner
Sleepy Puppy : Advanced XSS Scanner

Sleepy Puppy is a cross-site scripting payload management framework that provides delayed XS...

Read more »

PowerMemory : Credential Stealer Script For Wndows.
PowerMemory : Credential Stealer Script For Wndows.

PowerMemory is a powerful script which allows pen testers to extract user credentials present ...

Read more »
 
Top