\ \ / / _ \/ ___| ___| | ___ _ \ \ /\ / /| |_) \___ \ / _ \ |/ …
Most Important Tools and Resources For Security Researcher, Malware Analyst, Reverse Engineer and Security Experts
Hex Editors A hex editor (or binary file editor or byteeditor) is a type of computer program that allows for manipulation of the fundamental …
Android Application Penetration Testing – Part 9
In Last Part, Android Application Penetration Testing Part 8 We have seen about the Attacking through Content Provider when an app wants to share …
OMG: Fake WhatsApp Android App Downloaded Over 1 Million People’s
Fake WhatsApp Android App called “Update WhatsApp” has been Downloaded by 1 Million Peoples and trick users into downloading it …
Critical Tor Browser Bug “TorMoil” Allows to the Leakage of Your Real IP Address
A Critical Tor Browser Bug called “TorMoil” Allows to Leak your real IP Address that you’re using for Browsing especially …
Cisco Global Exploiter & CAT -Auditing & Exploit 14 Vulnerabilities in Cisco Switches and Routers
Cisco Global Exploiter (CGE) Cisco Global Exploiter (CGE), is an advanced, simple and fast security testing tool / exploit engine, …
Estonia Blocked 760,000 National Electronic ID cards due to Critical Crypto Vulnerability Detected in ID Chip
The Republic of Estonia Decides to Cancel 50,000 ID cards issued starting from October 2014 due to potential Crypto vulnerability …
Top 10 Dangerous Computer Viruses of All Time
1. Storm Worm The latest virus on our list is the dreaded Storm Worm. It was late 2006 when computer …
Malaysia Telco Hack – Corporations Spill 46 Million Records
The Malaysia Telco Hack has been blowing up in the news with over 46 Million Records being leaked including IMEI …
Hackers Poisoning the Google Search Results to Spreading Highly Sophisticated Banking Malware
Hackers poisoning Google search results to spreading stealthy Banking Trojan by targetting financial-related keyword searches and make this trojanized Malicious …