today-is-a-good-day
Rotexy Malware Trojan, Rotexy, Android Malware, Android Virus, Android Threats, Security, Hacking, Android

Russia Got Targeted By Rotexy Trojan

0
Due to the hipe of trojan activity, Kaspersky decided to do a deep analysis of the evolution of popular malware family. And they found one most interesting (Rotexy) trojan...
Loki Botnet, malware, Security Threat, Loki, Botnet

Loki Got an upgrade – Loki Botnet new varient Detected

0
Loki Botnet (Malware) works in the same way as Marvel's Villen cum hero works (Trick the user and steal the information). Loki botnet, A bot (malware) which was detected...
DemonBot, Botnet

Demonbot is on rising | A New Botnet

0
As security is getting stronger so hackers are getting more stronger. Once a loophole is closed by Operating systems or any vendors then hackers find out another way to breach...
Malware analysis sandboxing

What is Sandboxing and How it works?

0
In this article, we will discuss sandboxing, how it works and list of free sandboxing environments, etc. Hybrid analysis, Malware analysis, and Threat analysis, they all use the same technology...
wannacry ransomware cyber attack

WannaCry ransomware attack: Largest Ransomware Attack In The History

0
By now, we are sure that you have heard something about wannacry ransomware. There may be a lot of questions in your mind such as What is wannacry ?...
ransomware

What is Ransomware and How it works?

0
Attackers use ransomware to get ransom from its victims. In other words, ransomware is a malicious program or software to block user access on their own system or encrypt...

How to make sure a file is safe or threat? | How to do...

0
Today, we will discuss how to find, a file is safe or a threat for your system? Or we can say, how to do malware and threat analysis? Watch Video on...
Mac Malware: Time to test Mac security

Mac Malware: Time to test Apple’s Security

0
Last quarter shows an interestingly spike in malware activity that targeted Mac users only. New samples in the 1st 3 months of this year are nearly equal to the...

An Almost Impossible To Detect Phishing Attack Using Punycode

0
In our previous article How to secure you account from phishing page, we discussed about how to create and detect whether a page is a phishing page or original...
android banking trojan

Android Banking Trojan Hiding In Apps Under Different Names: Targeting over 420 apps worldwide

0
Beware if you recently have installed any funny video application from Google Play Store as it may contain android banking Trojan. Most of the people love to watch funny videos...
Pixabay Sensitive Documents

Managing the Safety and Security of Sensitive Documents

0
The digital era has made it effortless and more efficient to conduct business than ever before, be it in a local space or on a largely worldwide scale. In...
Attackers are using facebook messenger to spread Locky Ransomware

Attackers are using facebook messenger to spread Locky Ransomware

0
Any Facebook message with an image file (.svg format) send by your friend can be a Locky Ransomware file, so just avoid clicking it. What is Locky Ransomware? Locky is ransomware released...
How to Choose a Router for Your Business

How to Choose a Router for Your Business

0
If you think that choosing a router for your business is an easy task, you have no idea how wrong you are. It is not like choosing a standard...
Introduction to Log Collector and Event Sources | SIEM

Introduction to Log Collector and Event Sources | SIEM

0
In this article, we will discuss how we use a log collector to collect and analyze logs. While in the previous article we have discussed Logs. We already have...
Install Honeypot in Kali-4

How to Install Honeypot on Kali Linux

0
In this article we will show how to install Honeypot in Kali Linux. The Pentbox is Security suite that can be use for penetration testing to perform various operations. The...
Droid Trubo new update started rolling out1

Droid Turbo new update started rolling out

0
Droid Turbo new update started rolling out : New updates brings latest security patches and some performance related improvement to Droid Turbo, recently Verizon has stated rolling out a...
Top Vpn providers 2016

Top Free Vpn Provides 2016

0
A VPN (Virtual Private Network) extends your private network across a public network, such as a company internal network. There are several numbers of system that enables you to...

End-To-End Encryption is now on WHATSAPP

0
On Tuesday,Whatsapp's founder Jan Koum disclosed that all the messages and call which are done through Whatsapp are fully encrypted.Whatsapp is now lot more secure. All user those who want...
exploit search in metasploit

Explore and Search Exploit in Metasploit

0
Metasploit having a big name, when we talking about security. Metasploit was written in Perl as a portable network tool, In 2007 the Metasploit  Freamwork has completely rewritten in...
Bitport Review : Download torrents to your cloud and play them online

Bitport Review : Download torrents to your cloud and play them online

Bitport.io review :Most of the people here use torrent to download movies, games , series , software and much more. But there is a question is it safe to...
crack password using hydra and burpsuit

How To Crack Web Form Passwords Using Hydra With Burpsuite In Kali Linux

0
In our previous article How To Crack Password Using Hydra In Kali Linux , we have discussed about THC Hydra- A tool for Online Password attacks. In this tutorial we will discuss...
crack web form

How To Crack Password Using Hydra In Kali Linux

0
Weak password is still a big problem in the world of security. User need to set a strong password to restrict the access of data from anonymous user. Even a...
Guccifer hacker extradited to the US

Guccifer hacker extradited to the US

0
Guccifer is a egregious Romanian hacker,whose real name is Marcel Lazar Lehel has been permitted to abandon to the United States to face Computer Intrusion and Identity theft charges...
Let’s Encrypt released a Beta version

Let’s Encrypt: Free SSL Certificate Install by 1 Million websites

0
Let’s Encrypt published 1 million free Transport Layer Security SSL Certificates to webmasters who want to secure their connection between their users and domains and has achieved a vast...
Developer of most secure messaging app hired by Apple

Developer of most secure messaging app hired by Apple

0
This time Apple is very sincere about upgrading the security of its iPhone so that no can hack it.Apple also hired one of the key builders of signal to...
Phishing malware crashes ICICI bank

Phishing malware crashes ICICI bank

0
#Phshing Malware crashes ICICI bank .... https://t.co/a8vTOVvuob — Buffercode (@buffercoding) February 25, 2016   Official @ICICIBank_Care reply to tweet : @buffercoding Hi, ICICI Bank has a robust & multi-level security system for all its banking...