Tuesday, August 22, 2017

18,000 malicious apps are stealing the text messages from your android device

Knowing that there are number of Android apps that are stealing the copies of the text messages received or sent to your device may leave you a bit insecure, but it...

15 Year old Boy Arrested as the suspect of TalkTalk cyber Attack

After the data breach of largest phone and broadband provider in UK, police for the first time has taken some action. Last week TalkTalk the biggest Phone and Broadband provider in UK...

CIA Director’s hacked email: Pak uses militants to counter India’s Influence in Afghanistan

Last week WikiLeaks started publishing the documents from the CIA Director’s hacked email revealing some top secrets. A set of document of released by WikiLeaks says that Pakistan uses militants as...

WikiLeaks to publish the content from CIA’s Director Email

You must have visited the website of WikiLeaks, the non-profit and transparency organisation to read about the leaks and top secrets of this world. And now Julian Assange, the founder of WikiLeaks...

Apple refused to unlock the iPhone on the enforcement of U.S Federal Judge

Once again the tech giant Apple has proved that how much they are concerned about the privacy of its users, and they will never break the users’ security for government officials. Yes,...

Google is going to mandate the Full Disk Encryption by default for devices with...

Last year when Google launched Android Lollipop 5.0, Google wanted to make the full disk encryption mandatory, but due to some reasons the idea didn’t work. But this time with the launch...

Facebook’s New Notification Feature: Facebook will now Notify you if Government is Spying on...

Yet another feature by Facebook to make the world’s largest social network more secure. Facebook has just launched a new Notification feature that will alert you if it believes that someone...

ISIS Hacker Arrested In Malaysia: US Military Data Hacked By ISIS Hacker

A Kosovo citizen is arrested by Malaysian Authorities in the charges of computer hacking and providing the personal data of U.S. Military members to the Islamic State terrorist group (ISIS). Name of...

Radio Wave Hack: It allows the hacker to control your phone from 16 feet...

Every day we get to know about a different hack and every hack has its own dependencies and capabilities. Now, this is crazy. Security researchers have discovered a new hack “Radio Wave...

A new Zero-Day vulnerability in recently patched Flash Player

It seems to be no benefits of fixing the issues in its latest patch that was released by Flash Player yesterday. Adobe is trying its best to make the Flash player safe...

USB Killer 2.0 : It can destroy your system in just some seconds

Do you remember Killer USB? It is about the new version of Killer USB, this time with tremendous powers. Let’s talk a bit about the previous version of Killer USB, In march...

Apple Removed malicious Apps from App Store: Apps were installing the Root Certificates to...

Apple has recently removed some malicious apps from its App Store. According to Apple there were some apps on the App store that have the ability to negotiate encrypted connections between...
Obama Encryption Policy

Obama Encryption Policy: Are they violating the definitions of Security, Privacy and Encryption?

Obama Encryption Policy   As the consequences of exposure that Edward Snowden made about NSA, the citizens of USA are now demanding for more transparent security. From last some days citizens of USA are...
Hackers war

China Helped U.S.A: China Arrested Hackers on the Request of U.S Government.

China Arrested Hackers on the Request of U.S Government   The things happen in movies can actually happen in the real life too. The recent action of China reminds me of the latest...
NETGEAR Router Exploit

NETGEAR Router Exploit: Critical Bug in NETGEAR Router

Do you use NETGEAR Router, then have a look at it. NETGEAR Routers are once again vulnerable to the DNS Monitoring. A security researcher discovered that there is a serious vulnerability in...
WordPress XMLPRC: Brute Force Amplification Attack

WordPress XML-RPC: Brute Force Amplification Attack

It is always interesting to hear about the bugs in world’s most famous systems, this time it is WordPress. Yes the world’s most famous content management system is vulnerable to the...
Whatsapp data in cloud

Now BackUp Your WhatsApp Data to Google Drive

BackUp Your WhatsApp Data   The first thing comes to my mind when I think about losing my phone is “Oh! No I will lose all my data all the conversation” even the...
British Intelligence Agency can hack any Smartphone.

British Intelligence Agency can hack any Smartphone.

Yes it is true, British Intelligence agency has the power to hack any Smartphone in the World. This fact was disclosed by former NSA contractor Edward Snowden, he told the BBC...
outlook hacked

Hackers Attacked Microsoft Outlook Web App to steal Login Credentials

Hackers Attacked Microsoft Outlook Web App to steal Login Credentials   Researchers have recently founded a hazardous Backdoor in Microsoft’s Outlook Web Application, which allows the hackers to steal e-mail and passwords from...
StageFright 2.0 fixed

StageFright 2.0 Fixed: Google released an OTA for Nexus Devices.

StageFright 2.0 Fixed Few days back, the researchers warned google of the new Stage Fright Bug. This bug affected more than a billion devices that are running on Android OS. This newly found...
iphone 6s Malware

iOS Malware – YiSpecter

iOS Malware- YiSpecter Cybersecurity firm Palo Alto has recently discovered a new Malware in Apple named YiSpecter .I don't know what's wrong is going on with Apple as this is another serious...

Shocking: AdBlock has been Sold to an Anonymous Buyer

It might be a bit shocking for you but TRUE!!! The most popular ad blocking extension Ad block has been sold. And more scandalous news is the buyer of the AdBlock Extension...
Stage fright Bug 2.0: All Android Devices are Vulnerable to the Bugs

Stage fright Bug 2.0: All Android Devices are Vulnerable to the Bugs

Once again the Stage fright vulnerability is back, two new Android Stage fright vulnerabilities are recently disclosed. This time with some new tricks, an attacker can hack the Android Phone just by...
ios 9.0.2 bypass

IOS 9.0.2 fixes the Lock screen ByPass Bug

IOS 9.0.2 fixes the Lock screen Bypass Bug After the launch of its latest version of iOS, Apple has rolled out two minor updates for its operating system (iOS9.0.1 and iOS 9.0.2)...
Yahoo! Web Application Security Scanner

Yahoo! Launched its own Web Application Security Scanner

Yahoo! Launched its own Web Application Security Scanner   Gryffin, the web application security scanner by Yahoo! is now open source for the purpose to improve the safety on the web for every...
SQL Injection with buffercode

SQL INJECTION BY VARIOUS WAYS

SQL INJECTION BY VARIOUS WAYS INTRODUCTION TO SQL INJECTION The most easiest way to hack an site is hacking it by SQL injection. SQL Injection based on the vulnerabilities of an SQL database....