Tor is a free software and an open network that helps you defend against traffic analysis, a form of network surveillance that thre...
PayPal Critical Vulnerability To Steal User's Credit Cards in Clear Text Format
Image credits: PayPal.com A critical security vulnerability has been discovered in the eBay-owned PayPal that could allow attackers ...
Hacking Gmail With Fridge : Samsung smart fridge leaves Gmail logins vulnerable to attack
Image courtesy: slate.com Security researchers have discovered an exploit that could potentially steal Gmail credentials of a user wh...
Task Hijacking Attack: Another Dreaded Android Vulnerability
It's really hard time for Android, as yet another serious vulnerability was discovered recently. The issue resides in the multitas...
Using Deprecated RIPv1 Routing Protocol for Reflection DDoS Attacks
Image credits: Prolexic Security Engineering and Research Team RIPv1 Protocol RIPv1, the short form of routing Information prot...
Car Hacking : Megamos Crypto Transponder Vulnerability.
Car hacking ain't new anymore, we've seen the demonstration by Charlie Miller and Chris Valasek on hacking an internet conne...
Hacking Android Pattern Lock (ALP)
Android pattern lock is the password alternative Google introduced in 2008 with the launch of its Android mobile OS. New studies show t...
Circuit Fingerprinting-Unmasking Tor Users without Decrypting Traffic.
Image source : https://people.csail.mit.edu/devadas/pubs/circuit_finger.pdf Well.., Looks like the reliability of Tor Is Peeling of...
The Quantum Cryptography System: Uncrackable encryption.
Absolutely Unbreakable Encryption Japanese tech giant Toshiba is all set to create the next level of encryption technology that the f...
Vulnerability In BitTorrent Can Be Exploited For DDoS Attacks
The BitTorrent protocol is a file-sharing protocol used by Millions of online users to exchange files over the Internet on a daily bas...
Firefox stealthily loads webpages arising Privacy & Security concerns.
Image courtesy: geeky-gadgets.com Many browsers do pre-fetching and caching of web pages for speed and performance optimization. But ...
Hackers Can Attack Gas Stations and Blow It Up.
Anything can be hacked, not just cars, snipers, smartwatches or skateboards. Hackers are attacking anything that is connected to the In...

Lenovo Caught Installing Rootkits In Their PCs !
One of the most popular Chinese computer manufacturers ‘Lenovo’ has been caught once again using a hidden Windows feature to preinsta...
Windows Mount Manager Bug - Birth of Next StuxNet ?
Windows Mount Manager Bug Microsoft recently patched a vulnerability in Windows Mount Manager , a driver in mountmgr.sys that assigns d...
Bettercap - Advanced MITM tool & Framework
What is Bettercap? Bettercap is a complete, modular, portable and easily extensible MITM tool and framework with every kind of diag...
StageFright: Worst Android RCE Bug ever
Android Remote Code Execution Vulnerability This RCE bug was found to affect almost all versions of android, right from the 2.2 to 5...
HORNET: Ultra High Speed & Secure TOR Alternative
Tor network alternative For many years until now, userTor has been the favorite option to maintain anonymity on the Internet. Tor was...
R.I.P Adobe Flash. Final Nail in The Coffin By Google.
Google to kill Adobe Flash Adobe flash has been sentenced to death by most of the applications and platforms and now it seems to ...
Hacking Team Data Breach-Overview Of Leaked data
Hacking Team got Hacked! Hacking Team is an Italian company that sells intrusion and surveillance tools to governments and law enforcem...