A largest dark web database discovered in Underground Community Forum that contains almost 1.4 billions clear text Credentials and this …
Android ransomware kits are on rise
The popular Android operating system powers more than two billion devices and cybercriminals have their fingers on the pulse, with …
New BlackArch Penetration Testing Linux ISOs Released with More Hacking Tools
BlackArch Linux based Arch Linux. Lightweight Penetration Testing Distro designed for Professional & Elite Hackers who have the ability to …
Kaspersky Lab is closing its Washington DC office
Russian cybersecurity firm Kaspersky has had a rough season stateside amid claims the company’s software scans for and steals documents …
Australian Airport Hacked: Significant Amount of Security Data Stolen by Vietnamese Hacker
A Vietnamese hacker penetrates into Perth Airport’s computer system’s and stole sensitive details such as building plans and security details. …
Android Application Penetration Testing – Part 10
Attacking Broadcast receiver: A Broadcast Receiver is an Android Component which allows you to register for system or application events.We …
Linux.ProxyM used to Launch Numerous Hacking Attempts against Websites through Various Methods (SQL injections, XSS, LFI)
Linux.ProxyM malware was well known for infecting almost any Linux devices which include routers, set-top boxes, and other equipment. It …
Over 25,000 ransomware infected Windows daily in Q3: Report
The ‘Quarterly Threat Report’ from IT security solutions provider Quick Heal Security Labs states that during Q3 2017, Microsoft Windows …
testssl.sh – Tool to check cryptographic flaws and TLS/SSL Ciphers on any Ports
testssl.sh is a free command line tool which checks a server’s administration on any port for the help of TLS/SSL …
Surprising Differences between TLS and SSL Protocol
TLS is simply a successor of SSL 3.0, TLS is a protocol which provides Data encryption and Integrity between communication …