Linux Privilege Escalation through SUDO abuse.If you like the tool and for my personal motivation so as to develop other …
CTFTOOL – Interactive CTF Exploration Tool
An Interactive CTF Exploration ToolThis is ctftool, an interactive command line tool to experiment with CTF, a little-known protocol used …
Boeing 757 Airplanes are Vulnerable to Remote Hacking
U.S. Department of Homeland Security (DHS) conducted a test on Boeing 757 jets.The test was successful and Remote Hacking was tested …

Hackers Claim Million-Dollar Bounty for iOS Zero Day Attack
HACKING APPLE’S IOS isn’t easy. But in the world of cybersecurity, even the hardest target isn’t impossible—only expensive. And the price …
CryptoPHP – Backdoor in Thousands of CMS Plugins & Themes Used to Hijack Web Servers
Security researchers have discovered thousands of backdoored plugins and themes

Authentication Flaw in PayPal mobile API Allows Access to Blocked Accounts
Payment services provider PayPal is vulnerable to an authentication restriction bypass vulnerability,which could allow an attacker to bypass a filter …

‘iWorm’ malware controls Macs via Reddit, more than 17K affected : How about yours?
While it’s still unclear exactly how it spreads, a new Mac OS X virus has been discovered using Reddit’s

Hacking any eBay Account in Just 1 Minute
Four month ago, a massive data breach on the eBay website affected 145 million registered users worldwide

New Android Browser Vulnerability Is a “Privacy Disaster” for 70% Of Android Users
A Serious vulnerability has been discovered in the Web browser installed by defaulton a large number (Approximately 70%)

Popular Photo Sharing Website Likes.com Vulnerable To Multiple Critical Flaws
Likes.com, one of the emerging social networking site and popular image browsing platform,