Phishing is one of the most common problems for Internet Users, hackers find a new innovative method to create believable …
Critical Flaw in Popular BitTorrent Transmission Client Leads to an Attacker Perform Remote Hack into Your PC
Bit Torrent Transmission Client performing download an seeding operation using Client and server architecture with helping of the daemon. Tavis …
Customers Face Credit Card Misuse after using OnePlus webstore
An immense number of OnePlus customers claim to have been a victim of credit card fraudulent after they purchased the …
Four Malicious Chrome Extensions Impacted More than Half a Million Users
Security researchers from Cybersecurity firm ICEBRG detected four malicious chrome extensions that impacted more than half a million people. The …
OWASP ZSC – Obfuscated Code Generator Tool
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert …
Beware of Fake Spectre and Meltdown Patches Pushing Malware – Smoke Loader
Crooks trying to take advantage of the infamous bug Meltdown and Spectre which affects almost all the modern processors and …
FakeBank Malware Layered Obfuscation Technique Replace a Default SMS App to Stealing Highly Sensitive Data
A New persistent malware family called FakeBank spreading across Russian speaking nations and targetting Russian banks with sophisticated Obfuscation technique …
Chinese hackers target Taiwan cyber system!
A group of Chinese hackers, of late, has ganged up to spoil the cyber system in Taiwan if the US …
Fourth Fappening – Hacker Pleads Guilty to Hacking into iCloud accounts of Celebrities
Fourth Fappening Hacker George Garofano,26 plead guilty in Federal court for computer hacking offense and the 26-year-old is going to …
Lenovo Discovered a Backdoor in Network Switches Which Allows Attacker Could Perform DDOS
Lenovo discovered a backdoor in network switches that powered by Enterprise Network Operating System firmware during the security audit by …