Recently the news came out of a ransomware attack in Old Delhi after three of the hacked victims came forward …
Malicious Code in Kids Game Apps on Google Play Pushing Porn Ads – More than 60 Game Apps Infected
Cybercriminals started focussing on game apps which are used by children to install fake apps, registering premium services and porn …
Intel AMT Security Issue allows Local Attacker to get Complete Control Over any Laptop
Security researchers identified a significant security flaw with Intel AMT(Active Management Technology) utilized for remote monitoring and maintenance in corporate …
WINSpect-Powershell based Windows Security Auditing Toolbox
WINSpect is the PowerShell based windows auditing tool to enumerate and identify security weaknesses with windows platform and results of this audit can …
New Wi-Fi version to counter hackers
A new Wi Fi version is set to hit the market to replace WAP2 to more firmly deal with the …
A Man Used Fruitfly macOS Malware over 13 Years For Spying Thousand of Computers
A Cyber Crime case charged again a man who belongs to Ohio for using critical macOS malware called Fruitfly to …
Skype to add End-to-End Encryption for Audio, Text messages, Images and Videos
Microsoft to add end-to-end encrypted Private Conversations for Audio, Text messages, Images, and videos and now for available for Skype …
Kodak Launches Own Cryptocurrency KODAKCoin — Stocks Surge
In a tie-up with WENN Digital, a blockchain development firm, Kodak photo-centric cryptocurrency, KODAKCoin, causing a 60 percent stock rise …
Android Application Penetration Testing – Part 11 – Android Checklist
Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to use some …
Oracle Weblogic Exploit to Deploy Monero Miner
Oracle WebLogic application server is vulnerable to cryptocurrency mining.The security researcher has found this exploit to mine monero coins in the …