A critical vulnerability discovered in GoAhead Servers with versions running below 3.6.5 allows an attacker can exploit a remote code in GoAhead …
Sublist3r – Tool for Penetration testers to Enumerate Sub-domains
Sublist3r a python based enumeration tool that enumerates subdomains of the domain using Google, Yahoo, Bing, Baidu, and Ask. It also enumerates subdomains …
Chinese Man Sentenced to Five Years Prison for Illegally Running VPN Service
A chinese man Wu Xiang Yang sentenced to five years and six months also fined 500,000 yuan for running private VPN …
Parents should be on guard against hackable toys
While Internet-connected toys are particularly appealing to a generation of tech-obsessed kids, security experts warn against the potential dangers of …
Edward Snowden Privacy Protection app turns your Android phone Into A Security System
Edward Snowden privacy protection app Haven turns your Android phone into a motion, sound, vibration and light detector, watching for …
Most Powerful DoS Tool XERXES – Kali Linux Tutorial
In this Kali Linux Tutorial, we show you how to use xerxes in launching a DOS attack.DDOS tools are capable …
Facebook Will Alert You if Someone Upload Your Photo Using New Facial Recognition Technology
Facebook announced new optional tools with new face recognition technology which are now rolling out to alert you when someone uploaded …
InSpy – Linkedin Information Gathering tool for Pentesters
The objective of this Information Gathering tool is to extract Linkedin users based on the organization, job description or email …
Mobile Security Testing to Protect Your Applications From Cyber Threats
Owing to the sudden increase in the use of smartphones, tablets and other mobile devices, mobile application these days are …
Digmine – Cryptocurrency Mining Malware Spreading via Facebook Messenger
Malware miners are in the raise starting from this year, attackers using various social engineering and more sophisticated attacks for …