Android security testing is more often used by security industries to test the vulnerabilities in Android applications. Here you can …
Virtual Private Network: What is it and Why is it So Important To Protect Your Privacy?
Computers and the Internet have become one of the main means of transmitting and processing information. Most of the information …
Beware !! Fake Android Apps Claimed as a Cryptocurrency Exchange Platform – Jio Coin
Fake apps under the name JioCoin are continuously uploading into Google play store that claims to help users to invest …
New Variant of Scarab Ransomware Distributed via RDP on Systems and Servers
Security researchers from Malwarebytes detected Scarab ransomware variant distributed through RDP and used AES algorithm for encryption. The Scarabey variant …
Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack
Disabling and bypass SSL pinning Certificate Pinning is an extra layer of security to achieve protection against man-in-the-middle. It ensures …
Latest Google Dorks List 2018 For Ethical Hacking and Penetration Testing
Google Dorks List “Google Hacking” is mainly referred to pull the sensitive information from Google using advanced search terms that …
17 year old school boy arrested for Creating Malware that steals Cryptocurrency Wallet Private key passwords
A 17-year-old schoolboy arrested by Japanese police expecting to be the author of a Malware that steals Cryptocurrency Monacoin wallet …
Droidclub Botnet via Malicious Chrome Extensions That Affect More Than Half a Million Users
Security researchers from Trend Micro detected a new botnet dubbed Droidclub distributed through malicious chrome extensions. Attackers used malvertising and …
Beware!! New Zero-day Vulnerability Found in Adobe Flash Player – Still No Patches Available
Adobe Flash Player now suffering from brand New Zero-day vulnerability with high severity rate and researchers believes that it cause …
Cryptocurrency Mining Smominru Botnet Infected more than 500,000 Windows Machines
Security researchers from Proofpoint detected Monero miners that spread using the infamous EternalBlue Exploit. Attackers using persistent Botnet dubbed Smominru …