A Vietnamese hacker penetrates into Perth Airport’s computer system’s and stole sensitive details such as building plans and security details. …
Android Application Penetration Testing – Part 10
Attacking Broadcast receiver: A Broadcast Receiver is an Android Component which allows you to register for system or application events.We …
Linux.ProxyM used to Launch Numerous Hacking Attempts against Websites through Various Methods (SQL injections, XSS, LFI)
Linux.ProxyM malware was well known for infecting almost any Linux devices which include routers, set-top boxes, and other equipment. It …
Over 25,000 ransomware infected Windows daily in Q3: Report
The ‘Quarterly Threat Report’ from IT security solutions provider Quick Heal Security Labs states that during Q3 2017, Microsoft Windows …
testssl.sh – Tool to check cryptographic flaws and TLS/SSL Ciphers on any Ports
testssl.sh is a free command line tool which checks a server’s administration on any port for the help of TLS/SSL …
Surprising Differences between TLS and SSL Protocol
TLS is simply a successor of SSL 3.0, TLS is a protocol which provides Data encryption and Integrity between communication …
Janus Vulnerability – Hackers to Modify Android Apps Code Without Affecting Their Signatures
Janus Vulnerability, a new flaw discovered in Android apps that is capable of modifying the Android app’s code without making …
Hacker from Samara city sentenced for Creating and Selling Malware
Sergei Materov, a 42-year old hacker from Samara, the sixth largest city in Russia, has been sentenced at the Prikubansky …
Exploitation Framework for Embedded devices – RouterSploit
The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing …
Keylogger Discovered in HP Notebook Keyboard Drivers
HP Notebook Drivers contains Keylogger vulnerability that can be abused by hackers and steal the user’s information which could be …