A Cyber Crime case charged again a man who belongs to Ohio for using critical macOS malware called Fruitfly to …
Skype to add End-to-End Encryption for Audio, Text messages, Images and Videos
Microsoft to add end-to-end encrypted Private Conversations for Audio, Text messages, Images, and videos and now for available for Skype …
Kodak Launches Own Cryptocurrency KODAKCoin — Stocks Surge
In a tie-up with WENN Digital, a blockchain development firm, Kodak photo-centric cryptocurrency, KODAKCoin, causing a 60 percent stock rise …
Android Application Penetration Testing – Part 11 – Android Checklist
Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to use some …
Oracle Weblogic Exploit to Deploy Monero Miner
Oracle WebLogic application server is vulnerable to cryptocurrency mining.The security researcher has found this exploit to mine monero coins in the …
macOS High Sierra’s App Store System Can be Unlocked by Any Password
New bug discovered in macOS High Sierra allows unlocking the App Store System Preferences by any password. App Store System …
Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 …
New Programming Language “Kotlin” used for Developing an Android Malware
An Open-source Programming language “kotlin” has bee used to develop malicious Android apps that are capable of hijacking an Android …
Florida hack exposes 30K Medicaid patients’ files
Florida officials announced late Friday that hackers may have accessed the personal information and medical records of up to 30,000 …
Ransomware Attack Response and Mitigation Checklist
Ransomware is one of the fast Growing threat in the worldwide and its considered as a leader of Global cyber …