A new Critical CSRF Vulnerability discovered in widely used phpMyAdmin open source admin tool allows an attacker perform harmful database …
Hijacker – Reaver For Android Wifi Hacker App
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful …
fsociety a Complete Hacking Tools pack that a Hacker Needs – Penetration Testing Framework
fsociety is a penetration testing framework consists of all penetration testing tools that a hacker needs. It includes all the …
Chrome Extension Caught Silently Mining CryptoCurrency without Users Knowledge
Cryptocurrency Miners are in the raise starting from last year, more than 500 million computers are mining cryptoCurrency in their …
Fashion Retailer FOREVER 21 confirms Payment Card details stolen in the Security Breach
FOREVER 21 suffered data breach, users at certain stores are affected by the incident. Now FOREVER 21 released some additional …
Web Application Penetration Testing Checklist – A Detailed Cheat Sheet
What is Web Application Penetration Testing? Web Application Pen testing is a method of identifying, analyzing and Report the vulnerabilities …
Dreambot Banking Trojan Delivered via Resume-Themed Email
Dreambot banking Trojan which is a variant of Ursnif spreading via resume themed email, it is one of the most …
Kozlovsky from Lurk Hacker Group admits that his group involved in creation of WannaCry and DNC hack on Demand
Arrested Hacker Konstantin Kozlovsky from Lurk Hacker group admits that he is one of the Author of WannaCry ransomware and …
Risk with Steganography and Importance of running Steganalysis with Network Systems
Steganography is an art of hiding messages covert way so that exclusive the sender and recipient know the original message. …
Hacker’s can guess smartphone security pin using sensor data
The data collected from different sensors on your smartphone can reveal PINs and passwords to hackers and allow them to …