Cybercriminals started focussing on game apps which are used by children to install fake apps, registering premium services and porn …
Intel AMT Security Issue allows Local Attacker to get Complete Control Over any Laptop
Security researchers identified a significant security flaw with Intel AMT(Active Management Technology) utilized for remote monitoring and maintenance in corporate …
WINSpect-Powershell based Windows Security Auditing Toolbox
WINSpect is the PowerShell based windows auditing tool to enumerate and identify security weaknesses with windows platform and results of this audit can …
New Wi-Fi version to counter hackers
A new Wi Fi version is set to hit the market to replace WAP2 to more firmly deal with the …
A Man Used Fruitfly macOS Malware over 13 Years For Spying Thousand of Computers
A Cyber Crime case charged again a man who belongs to Ohio for using critical macOS malware called Fruitfly to …
Skype to add End-to-End Encryption for Audio, Text messages, Images and Videos
Microsoft to add end-to-end encrypted Private Conversations for Audio, Text messages, Images, and videos and now for available for Skype …
Kodak Launches Own Cryptocurrency KODAKCoin — Stocks Surge
In a tie-up with WENN Digital, a blockchain development firm, Kodak photo-centric cryptocurrency, KODAKCoin, causing a 60 percent stock rise …
Android Application Penetration Testing – Part 11 – Android Checklist
Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to use some …
Oracle Weblogic Exploit to Deploy Monero Miner
Oracle WebLogic application server is vulnerable to cryptocurrency mining.The security researcher has found this exploit to mine monero coins in the …
macOS High Sierra’s App Store System Can be Unlocked by Any Password
New bug discovered in macOS High Sierra allows unlocking the App Store System Preferences by any password. App Store System …