Without a doubt, the Emotet trojan is today’s top malware threat, in both terms of quantity (due to its huge …
5 Signs You Have a Bad VPN
How do you choose a VPN? What is the basic criterion? Price? Coverage? Quality? What to consider choosing the best …
XSS-Freak – An XSS Scanner Fully Written In Python3 From Scratch
XSS-Freak is an XSS scanner fully written in python3 from scratch. It is one of its kind since it crawls …
Top Ten security settings for a secure Windows 10 Computer
Windows 10 is by far the most acknowledged Windows operating system. Microsoft rolls out updates frequently to ensure bugs are …
DOJ charges four Chinese military hackers for Equifax hack
The US Department of Justice announced today charges against four Chinese hackers for breaching US credit reporting agency Equifax in …
Pytm – A Pythonic Framework For Threat Modeling
Define your system in Python using the elements and properties described in the pytm framework. Based on your definition, pytm …
InjuredAndroid – A Vulnerable Android Application That Shows Simple Examples Of Vulnerabilities In A CTF Style
A vulnerable Android application with ctf examples based on bug bounty findings, exploitation concepts, and pure creativity. Setup for a …
FBI is investigating more than 1,000 cases of Chinese theft of US technology
Special feature Cyberwar and the Future of Cybersecurity Today’s security threats have expanded in scope and seriousness. There can now …
Windows 7 bug prevents users from shutting down or rebooting computers
Image via @Trendswood A weird bug of unknown origins has been hitting Windows 7 computers this week, according to multiple …
Acunetix v13 – Web Application Security Scanner
Acunetix, the pioneer in automated web application security software, has announced the release of Acunetix Version 13. The new release …