This article is about collecting metadata from photographs. Metadata is an information which is created for every file’s format. Examples for …
Bitcoin Exchange YouBit Shutdowns after being Hacked Second Time this Year
Bitcoin exchange Youbit shutdowns services after it was hacked second time in the same year within eight months. The first …
123 Million American Households Sensitive Data Leaked Online – A Massive Data Leak
A massive database that contains 123 Million American households sensitive personal information leaked online by California-based data analytics firm. An …
New “GnatSpy” Mobile Malware Stealing data Such as Images, Text messages, Contacts, and Call History
A newly emerging mobile malware GnatSpy capable of abusing infected mobile and stealing various type of data such Images, Text …
coWPAtty Download – Audit Pre-shared WPA Keys
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys. If you …
Google to take action against misleading news sites
Amid a growing clamour against fake content online, Google has announced it may take off from its news index the …
Safehats – The Best Alternative Bug Bounty Program for HackerOne and Bugcrowd
A Bug bounty program also known as vulnerability rewards program (VRP) is the one where security researchers can disclose vulnerabilities …
DDOS a Website Anonymously by Using Kali Linux Tools
DDOS tools are capable of putting heavy loads on HTTP servers and bring them to their knees by exhausting its …
New Android Malware Physically Destroying your Phone by Running Cryptocurrency miner
Nowadays Trojanized Android apps evolving rapidly in play store and continuously targetting users, a new malware strain Trojan.AndroidOS.Loapi spotted consist …
Women in China Unlocked iPhone X Using Her Friend Face ID
A Women in China was able to unlock iPhone X through her friend facial recognition ID without using any 3D …