U.S. Department of Homeland Security (DHS) conducted a test on Boeing 757 jets.The test was successful and Remote Hacking was tested …
Important Security practices for users to Open Microsoft Office Documents Securely
Microsoft office documents utilized in wide by attackers to send the malicious file and then convincing the user to open …
Ordinypt ransomware disguises itself as an e-mail application
A new ransomware strain called Ordinypt (also known under the cryptic name “HSDFSDCrypt” or completely Win32.Trojan-Ransom.HSDFSDCrypt.A) is currently targeting victims …
All Android Version Except 8.0/Oreo are Vulnerable to Toast Overlay Malware Attack
A First Android malware called TOASTAMIGO has been discovered that capable of install other malware into infected devices using Toast Overlay attack. …
Skype Log Viewer Download – View Logs on Windows
Skype Log Viewer allows you to download and view the Skype history and log files, on Windows, without actually downloading …
Diving Deeper to Understand the Windows Event logs for Cyber Security Operation Center
Cyber Security operations center is protecting organizations and sensitive business data of customers. It ensures active monitoring of valuable assets …
Vault 8 Leaks: Wikileaks Revealed CIA’s Secret Malware Control System called “Hive” Source Code
Wikileaks revealed a source code for CIA’s Malware control system called Hive which is used by CIA to control their …
A New Hacking Group Spreading Sophisticated “Daserf” Backdoor using Steganography
A new Cyber cyberespionage group called REDBALDKNIGHT Spreading advance Daserf Backdoor against Japanese based government agencies such as biotechnology, electronics …
Ethereum Parity Bug Destroys Over $250 Million In Tokens
If you are into cryptocurrency or blockchain at all, you will have heard about the Ethereum Parity Bug that has …
Kickout Devices Out of Your Network and Enjoy all the Bandwidth
Are you fed up of your annoying roommate or flatmates because they are using all the bandwidth of your wifi …