Security PIN plays a vital role in protecting sensitive application such as banking applications, Wallets, and unlocking screen. It remains …
Web Trackers Exploit Browser Password Managers and Steal Login Information From Browser
A known browser vulnerability exploits the default browser Password manager that abused by third-party scripts and exfiltrate the hidden user …
Three more Malicious Backdoored plugins with More than 89,000 Active Installs found in WordPress Repository
WordPress has such a massive ecosystem consist of a number of plugins and themes, threat actors involved in various malicious …
What Is A Bug Bounty Program And Why Every Organization Needs One?
What Is A Bug Bounty Program? A Bug bounty program is also known as vulnerability rewards program (VRP) is the …
Acoustic Attack Against HDDs Can Cause Permanent Damage CCTV DVR, PCs, ATMs
Hard disks play a vital role in numerous computing systems including, personal computers, closed-circuit television (CCTV) systems, medical bedside monitors, …
Load Balancer-Reverse Proxy Reconnaissance On Target Domain
Reconnaissance work on target domain to find out target domain has load balancer so that penetration testing does not misdirect …
Top hoax stories of 2017
As we prepare to bid our adieu to 2017, let’s have a look back at the year’s trending news points …
USB Forensics – Reconstruction of Digital Evidence from USB Drive
Digitial Forensics analysis of USB forensics include preservation, collection, Validation,Identification, Analysis, Interpretation, Documentation, and Presentation of digital evidence derived from …
Russian Bank ATM Vulnerability Allows to Hack the ATM by Pressing Shift Key Five Times
A Russian user discovered a major ATM vulnerability in Windows XP running ATM machine that could be compromised by pressing …
KickThemOut -Tools to Kick Devices out of Your Network and Enjoy all the Bandwidth
KickThemOut -Tools to kick devices out of your network and enjoy all the bandwidth for yourself.It permits you to choose …