Passwords are the basic way to keep our data secure, easy to guess passwords and re-use of the password will …
Third-party swipes Dell’s web address for a month
A third-party took over the web address used by recovery software on Dell PCs for a month last summer after …
unCaptcha to Break reCaptcha System of Defense in 5.42 Seconds
Captcha challenge is the first line of defense to protect the website against attacks, it challenges to prove that you …
Beware – Dangerous IoT Attacks Leads Some One to Hack and Control Your Car
The Internet of Things (IoT), responsible for connecting unthinkable things, now offers the possibility of connecting vehicles to the internet. …
All Versions of MS Office Affected with Critical Zero-day Vulnerability Allows Attackers Take Full Control of your System
A Critical MS Office Zero-day Remote Code Execution Vulnerability discovered in Microsoft Office that could allow attacker to take complete …
Driftnet – Tool used to Capture Images that Your Friend looking Online
How we can launch an MITM attack with Websploit and the Driftnet – Tool used to capture images. MITM attack is a …
iOS Privacy issue – Now iPhone apps can Secretly access your Camera to take Videos and Pictures
Google Security Engineer Felix Krause discovered a privacy loophole in iPhone which can be abused by the malicious iOS app …
Hackers Can Steal Your Windows Login Credential Without User Interaction using New Windows OS Flow
Newly discovered dangerous Vulnerability in NTLM Architecture allows hackers to steal Windows NTLM password without any user interaction in all …
India among the target nations for cyber attack: CERT
A new cyber threat targeting Internet-connected devices is spreading rapidly and could enable hackers to identify vulnerabilities and access users’ …
Metasploit Can Be Directly Used For Hardware Penetration Testing Now
Security researchers and penetration testers have used the open source Metasploit Framework to probe for vulnerabilities, run exploits, and simulate …