The objective of this Information Gathering tool is to extract Linkedin users based on the organization, job description or email …
Mobile Security Testing to Protect Your Applications From Cyber Threats
Owing to the sudden increase in the use of smartphones, tablets and other mobile devices, mobile application these days are …
Digmine – Cryptocurrency Mining Malware Spreading via Facebook Messenger
Malware miners are in the raise starting from this year, attackers using various social engineering and more sophisticated attacks for …
Nissan Canada Data Breach May have Exposed more than 1 Million Customers Data
Nissan Canada suffers a data breach that may have exposed around 1.3 Million of sensitive customers records of Nissan Canada …
Microsoft Windows Face Authentication Bypassed with a Spoofed Photo
Windows 10 provides Face Authentication technology with specific Windows “Hello compatible cameras,” it uses a camera exceptionally designed for close …
Scanning for OWASP Top 10 Vulnerabilities with Metasploit for the Web(w3af)
w3af is an open source web application security scanner (OWASP Top 10) which enables developers and penetration testers to distinguish …
A Group Behind the VenusLocker Ransomware Switch into Secretly Mining Monero Cryptocurrency
A new malware attack distributing to mine Monero cryptocurrency by the group Behind the VenusLocker Ransomware. VenusLocker Ransomware discovered in …
Email Spoofing – Exploiting Open Relay configured Public Mailservers
Email spoofing is the way of delivering forged emails to recipients.These methods are used by criminals to launch attacks like phishing or …
Tracking Photo’s Geo-location with GPS EXIF DATA – Forensic Analysis
This article is about collecting metadata from photographs. Metadata is an information which is created for every file’s format. Examples for …
Bitcoin Exchange YouBit Shutdowns after being Hacked Second Time this Year
Bitcoin exchange Youbit shutdowns services after it was hacked second time in the same year within eight months. The first …