• Access news anywhere with our mobile app - FREE download
    • About Us
    • Submit Article/News
    • Advertise With Us
    • Privacy Policy
    • Contact Us
    • Disclaimer
Professional Hackers Professional Hackers
Professional Hackers Professional Hackers
  • Categories
    • Mobilify
      • Huge security flaw in macOS lets hackers steal your passwords
      • Motorola Moto G (2nd Gen) gets Android Marshmallow update
      • WhatsApp down on New Year’s Eve: Users worldwide unable to connect as messaging app crashes repeatedly
      • WhatsApp for Windows Phone update brings starred messages, new camera interface
      • Microsoft Lumia 950 Dual SIM, Lumia 950 XL Dual SIM Launched in India
      • Nokia C1 Leak Tips Launch With Android and Windows 10 Mobile
    • Lifestyle
      • A solar-powered “Lunar” smartwatch seems like a good idea — if it works
      • TV Service is being killed by Google Fiber; The Company wants to concentrate on High Speed Internet
      • Google Home now lets you set and manage your reminders
      • Hacker Steve Lord says Windows Phone is the”hardest nut to crack”
      • Google Makes Full-Disk Encryption Mandatory for New Android 6.0 Devices
      • Hike users can now send messages without internet
    • Social Media
      • Social-Analyzer – API And Web App For Analyzing And Finding A Person Profile Across +300 Social Media Websites (Detections Are Updated Regularly)
      • Six Methods to Create a Secure Password You’ll Actually Remember [INFOGRAPHIC]
      • Here’s how to kick nazis off your Twitter right now
      • Twitter CEO promises to crack down on hate, violence and harassment with “more aggressive” rules
      • Twitter users join 24hr boycott to protest online harassment
      • Twitter says it may “refine” its policies after reversing position on Blackburn campaign ad
    • Development & Design
      • WhatsApp video calling feature, new design leaked
      • Microsoft Lumia 950 Dual SIM, Lumia 950 XL Dual SIM Launched in India
      • Flipkart Partners With Google to Launch App-Like Mobile Website
      • Google Makes Full-Disk Encryption Mandatory for New Android 6.0 Devices
      • Indian govt to launch its own operating system for official use
      • Google Makes Website Making Easy With “Material Design Lite” and Free Website Builder
  • Hacking
    • All
      • Parrot 5.1 – Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind
      • Psudohash – Password List Generator That Focuses On Keywords Mutated By Commonly Used Password Creation Patterns
      • Hoaxshell – An Unconventional Windows Reverse Shell, Currently Undetected By Microsoft Defender And Various Other AV Solutions, Solely Based On Http(S) Traffic
      • Puwr – SSH Pivoting Script For Expanding Attack Surfaces On Local Networks
      • Zap-Hud – The OWASP ZAP Heads Up Display (HUD)
      • PHoS Recommendation : Join these 2 hacking webinar by one of the best security experts in India.
    • Vulnerability
      • Appshark – Static Taint Analysis Platform To Scan Vulnerabilities In An Android App
      • FISSURE – Frequency Independent SDR-based Signal Understanding and Reverse Engineering
      • Masky – Python Library With CLI Allowing To Remotely Dump Domain User Credentials Via An ADCS Without Dumping The LSASS Process Memory
      • Packj – Large-Scale Security Analysis Platform To Detect Malicious/Risky Open-Source Packages
      • BinAbsInspector – Vulnerability Scanner For Binaries
      • Pocsploit – A Lightweight, Flexible And Novel Open Source Poc Verification Framework
    • Cyber Laws & IT Acts
      • Sri Lanka arrests 2 men over Taiwan bank hacking
      • Here’s the Facebook Hacking Tool that Can Really Hack Accounts, But…
      • 3 Wipro employees arrested for hacking UK firm TalkTalk
      • Samsung agrees to pay Apple $548 million for copying its iPhone designs
      • Indian hackers ‘pay back’ Pakistan for 26/11
      • Boy, 15, arrested in Northern Ireland in connection with TalkTalk hack
    • Defacements
      • Sri Lanka arrests 2 men over Taiwan bank hacking
      • 324,000 Financial Records with CVV Numbers Stolen From A Payment Gateway
      • Over 800,000 Brazzers User Accounts Hacked
      • Aryabhatta college of Delhi University (DU) website hacked by Pakistani Hackers
      • Indian Railways page hacked by Al Qaeda. And this is the message they left for Indian Muslims
      • JNU’s Website Defaced by Indian Hackers
  • Cryptocurrency
  • Technohacks
    • Technohacks
      • ‘Pokémon Snap’ lives on through ‘Pokémon Go’ photography contest
      • Desk lamp transforms from notepad into a modern, stylish lamp
      • Nissan drove a GT-R around a racetrack using a PS4 controller
      • Razer’s first ever smartphone could be coming next month
      • Oculus Go solves VR’s two biggest problems
      • Truly driverless cars could soon be allowed on California’s roads
  • Downloads
    • All
      • Winevt_Logs_Analysis – Searching .Evtx Logs For Remote Connections
      • EAST – Extensible Azure Security Tool – Documentation
      • Suborner – The Invisible Account Forger
      • Monomorph – MD5-Monomorphic Shellcode Packer – All Payloads Have The Same MD5 Hash
      • Sandfly-Entropyscan – Tool To Detect Packed Or Encrypt ed Binaries Related To Malware, Finds Malicious Files And Linux Processes And Gives Output With Cryptographic Hashes
      • DFShell – The Best Forwarded Shell
  • Operating Systems
    • All
      • Your iPhone will Alert You if You are Being Monitored At Work
      • Warning! — Linux Mint Website Hacked and ISOs replaced with Backdoored Operating System
      • WhatsApp down on New Year’s Eve: Users worldwide unable to connect as messaging app crashes repeatedly
      • WhatsApp video calling feature, new design leaked
      • Bad Santa! Microsoft Offers — ‘Upgrade now’ or ‘Upgrade tonight’ to Push Windows 10
      • Samsung agrees to pay Apple $548 million for copying its iPhone designs
    • Android
      • Androidqf – (Android Quick Forensics) Helps Quickly Gathering Forensic Evidence From Android Devices, In Order To Identify Potential Traces Of Compromise
      • FireStorePwn – Firestore Database Vulnerability Scanner Using APKs
      • LibAFL – Advanced Fuzzing Library – Slot Your Fuzzer Together In Rust! Scales Across Cores And Machines. For Windows, Android, MacOS, Linux, No_Std, …
      • Cpufetch – Simplistic Yet Fancy CPU Architecture Fetching Tool
      • Umbrella_android – Digital And Physical Security Advice App
      • Ghost Framework – An Android Post-Exploitation Framework That Exploits The Android Debug Bridge To R emotely Access An Android Device

    Hacking Tools

    Hacking, Hacking Tools, Vulnerability

    Critical Tor Browser Bug “TorMoil” Allows to the Leakage of Your Real IP Address

    A Critical Tor Browser Bug called “TorMoil” Allows to Leak your real IP Address that you’re using for Browsing especially …

    November 5, 2017, 7:03 AMFebruary 23, 2021 743
    Hacking, Hacking Tools, Vulnerability

    Cisco Global Exploiter & CAT -Auditing & Exploit 14 Vulnerabilities in Cisco Switches and Routers

    Cisco Global Exploiter (CGE) Cisco Global Exploiter (CGE), is an advanced, simple and fast security testing tool / exploit engine, …

    November 5, 2017, 3:39 AMFebruary 23, 2021 891
    Hacking, Hacking Tools, Vulnerability

    Estonia Blocked 760,000 National Electronic ID cards due to Critical Crypto Vulnerability Detected in ID Chip

    The Republic of Estonia Decides to Cancel 50,000 ID cards issued starting from October 2014 due to potential Crypto vulnerability …

    November 4, 2017, 11:13 PMFebruary 23, 2021 734
    Hacking, Hacking Tools, Vulnerability

    Top 10 Dangerous Computer Viruses of All Time

    1. Storm Worm The latest virus on our list is the dreaded Storm Worm. It was late 2006 when computer …

    November 4, 2017, 4:41 PMFebruary 23, 2021 755
    Hacking, Hacking Tools, Top News, Vulnerability

    Malaysia Telco Hack – Corporations Spill 46 Million Records

    The Malaysia Telco Hack has been blowing up in the news with over 46 Million Records being leaked including IMEI …

    November 4, 2017, 3:49 PMFebruary 23, 2021 983
    Hacking, Hacking Tools, Top News

    WordPress site admins urged to update immediately

    Millions of websites running WordPress are being strongly urged to update to the latest version of the popular content management …

    November 4, 2017, 4:34 AMFebruary 23, 2021 667
    Hacking, Hacking Tools, Vulnerability

    Hackers Poisoning the Google Search Results to Spreading Highly Sophisticated Banking Malware

    Hackers poisoning Google search results to spreading stealthy Banking Trojan by targetting financial-related keyword searches and make this trojanized Malicious …

    November 4, 2017, 4:17 AMFebruary 23, 2021 744
    Android, Hacking, Hacking Tools, Vulnerability

    Penetration Testing Checklist with Android, windows, Apple & Blackberry Phones

    Here we are going to have a look about some of Common & important  Penetration Testing Checklist for widely used …

    November 3, 2017, 4:58 PMFebruary 23, 2021 829
    Hacking, Hacking Tools, Vulnerability

    Lynis – Open Source Security Auditing & Pentesting Tool – A Detailed Explanation

    Lynis is an open source security auditing tool. Its main goal is to audit and harden Unix and Linux based …

    November 3, 2017, 6:05 AMFebruary 23, 2021 918
    Hacking, Hacking Tools, Top News

    The new Silence Trojan on the loose

    In September 2017, Kaspersky Lab’s GReAT investigation team found a new trojan that was deployed to aid cyber-heists of banks …

    November 3, 2017, 4:41 AMFebruary 23, 2021 732

    Posts navigation

    Previous 1 … 157 158 159 160 161 162 163 164 165 166 167 168 169 Next

    PROFESSIONAL HACKERS ON SECURITY (PHoS)

    We are proud to offer premier information security updates, IT updates, Core Tools And Techniques across the globe. Our mission is to make the internet more secure, more trendy, more aware and more reliable.
    All latest updates on our RSS Feed:

    Popular Topics

    • About Us
    • Submit Article/News
    • Advertise With Us
    • Privacy Policy
    • Contact Us
    • Disclaimer

    REGISTERED AND PROTECTED

    DMCA.com Protection Status

    Copyrighted.com Registered & Protected  E2LP-N7OG-GVSP-XVNX

    All Rights Reserved.
    Access news anywhere with our mobile app:
    Menu
    • Categories
      • Mobilify
      • Lifestyle
      • Social Media
      • Development & Design
    • Hacking
      • All
      • Vulnerability
      • Cyber Laws & IT Acts
      • Defacements
    • Cryptocurrency
    • Technohacks
      • Technohacks
    • Downloads
      • All
    • Operating Systems
      • All
      • Android