The Republic of Estonia Decides to Cancel 50,000 ID cards issued starting from October 2014 due to potential Crypto vulnerability …
Top 10 Dangerous Computer Viruses of All Time
1. Storm Worm The latest virus on our list is the dreaded Storm Worm. It was late 2006 when computer …
Malaysia Telco Hack – Corporations Spill 46 Million Records
The Malaysia Telco Hack has been blowing up in the news with over 46 Million Records being leaked including IMEI …
WordPress site admins urged to update immediately
Millions of websites running WordPress are being strongly urged to update to the latest version of the popular content management …
Hackers Poisoning the Google Search Results to Spreading Highly Sophisticated Banking Malware
Hackers poisoning Google search results to spreading stealthy Banking Trojan by targetting financial-related keyword searches and make this trojanized Malicious …
Penetration Testing Checklist with Android, windows, Apple & Blackberry Phones
Here we are going to have a look about some of Common & important Penetration Testing Checklist for widely used …
Lynis – Open Source Security Auditing & Pentesting Tool – A Detailed Explanation
Lynis is an open source security auditing tool. Its main goal is to audit and harden Unix and Linux based …
The new Silence Trojan on the loose
In September 2017, Kaspersky Lab’s GReAT investigation team found a new trojan that was deployed to aid cyber-heists of banks …
Cryptocurrency wallets Hacked by “CryptoShuffler” Trojan & Stole $140,000 From Many Wallet ID
A newly discovered Trojan called “CryptoShuffler” stole around $140,000 from cryptocurrency wallets by replacing the Original Wallet address with another …
Domain Fronting – A New Technique For Hiding Malware Command and Control (C2) Traffic within a Content Delivery Network
A New Technique called ” Domain Fronting “ allow cybercriminals to hide the command & control Networks Traffic within a CDN. …