10 C
Delhi
Friday, December 14, 2018

Security News

Rotexy Malware Trojan, Rotexy, Android Malware, Android Virus, Android Threats, Security, Hacking, Android

Russia Got Targeted By Rotexy Trojan

Due to the hipe of trojan activity, Kaspersky decided to do a deep analysis of the evolution of popular malware family. And they found...
Loki Botnet, malware, Security Threat, Loki, Botnet

Loki Got an upgrade – Loki Botnet new varient Detected

Loki Botnet (Malware) works in the same way as Marvel's Villen cum hero works (Trick the user and steal the information). Loki botnet, A...
DemonBot, Botnet

Demonbot is on rising | A New Botnet

As security is getting stronger so hackers are getting more stronger. Once a loophole is closed by Operating systems or any vendors then hackers find...
Malware analysis sandboxing

What is Sandboxing and How it works?

In this article, we will discuss about sandboxing, how it works and list of free sandboxing environment etc. Hybrid analysis, Malware analysis and Threat...
wannacry ransomware cyber attack

WannaCry ransomware attack: Largest Ransomware Attack In The History

By now, we are sure that you have heard something about wannacry ransomware. There may be a lot of questions in your mind such...

Popular

Gaming

PUBG Live, Live, Streaming, Streaming using moible, PUBG mobile, PUBG Highest Kill

PUBG live Streaming using Mobile phone

Let's start PUBG streaming on facebook using the mobile phone. Yes, you read it correctly. Well, how many times you have seen this post...
Queen charge with Miner attack | Queen walk | Coc

Queen charge with Miners attack | COC

Queen charge with Miners is not a new strategy, that you are going to know now. But you have seen many time that queen...
Best Headset For Gaming and Music

How to buy best Gaming Headset

Looking For Best Headset for Gaming and Music that will provide a better gaming experience as well as music? Here is everything you need to know about Best Budget Gaming Headset before buying a new one.

Latest

PUBG Live, Live, Streaming, Streaming using moible, PUBG mobile, PUBG Highest Kill

PUBG live Streaming using Mobile phone

Let's start PUBG streaming on facebook using the mobile phone. Yes, you read it correctly. Well, how many times you have seen this post "Guys, watch me playing PUBG...
Queen charge with Miner attack | Queen walk | Coc

Queen charge with Miners attack | COC

Queen charge with Miners is not a new strategy, that you are going to know now. But you have seen many time that queen walk with miners failed to...
Incorporating Social Media in Business Can Help Employees

Benefits of Social Media for Business

Today many organisations are struggling to eliminate the use of smartphones and other devices to access their social media pages or accounts. Also, there seems to be an irresistible...
Best Headset For Gaming and Music

How to buy best Gaming Headset

Looking For Best Headset for Gaming and Music that will provide a better gaming experience as well as music? Here is everything you need to know about Best Budget Gaming Headset before buying a new one.
Virtualization

Virtualization in Mac | How to create Virtual machine in Virtual Box?

Virtual Machine Virtual machines are machines or systems that do not physically exist but gives the feel of working on a physical machine or system. To create a virtual machine,...

How To Download YouTube Video on Android Phone or Tablet

Today, YouTube is the largest video sharing websites in the digital world. Per day millions of people sharing millions of new videos on various topics. You can search any...
Malware analysis sandboxing

What is Sandboxing and How it works?

In this article, we will discuss about sandboxing, how it works and list of free sandboxing environment etc. Hybrid analysis, Malware analysis and Threat analysis, they all use the same...
wannacry ransomware cyber attack

WannaCry ransomware attack: Largest Ransomware Attack In The History

By now, we are sure that you have heard something about wannacry ransomware. There may be a lot of questions in your mind such as What is wannacry ?...
ransomware

What is Ransomware and How it works?

Attackers use ransomware to get ransom from its victims. In other words, ransomware is a malicious program or software to block user access on their own system or encrypt...

How to Capture and Record an IPhone, IPad screen without jailbreak ?

Nowadays, everybody wants to be a prominent YouTuber. Some wants to make money through it while others just do it for entertainment. The problem faced by a new YouTuber...

How to make sure a file is safe or threat? | How to do...

Today, we will discuss how to find, a file is safe or a threat for your system? Or we can say, how to do malware and threat analysis? Watch Video on...
Mac Malware: Time to test Mac security

Mac Malware: Time to test Apple’s Security

Last quarter shows an interestingly spike in malware activity that targeted Mac users only. New samples in the 1st 3 months of this year are nearly equal to the...

An Almost Impossible To Detect Phishing Attack Using Punycode

In our previous article How to secure you account from phishing page, we discussed about how to create and detect whether a page is a phishing page or original...
android banking trojan

Android Banking Trojan Hiding In Apps Under Different Names: Targeting over 420 apps worldwide

Beware if you recently have installed any funny video application from Google Play Store as it may contain android banking Trojan. Most of the people love to watch funny videos...
Good News For Gamers: Oculus reduces their Rift and controllers price

Good News For Gamers: Oculus reduces their Rift and controllers price

Oculus VR , one of the most famous company of making virtual reality headset hardware and software products. Palmer Luckey is the founder of this company. He founded this American...
Pixabay Sensitive Documents

Managing the Safety and Security of Sensitive Documents

The digital era has made it effortless and more efficient to conduct business than ever before, be it in a local space or on a largely worldwide scale. In...
Surge S1

Surge S1: Xiaomi Launched its own Processor

Xiaomi, one of the most popular smartphone maker company of China launched it own processor named Surge S1. Smartphones, Mobile Apps, Laptops making are specialties of this company. Xiaomi...
network administrative apps: Enhance the proficiency of the system administrators with these apps

Enhance the proficiency of system administrators with these apps

A network administrator is responsible for installing computer and network systems, maintaining and upgrading network systems and also monitoring those systems to improve the efficiency of the computer network....
Microsoft Hooks Up With Google for Office Mobile Apps

Microsoft Hooks Up With Google for Office Mobile Apps

The mobile application is generally designed to give comfort and reduce the time for the users. In this growing economy, everything is going to get digitized and mobile application...
TWITTER MOBILE APPS

VERSATILE ASPECTS OF USER-FRIENDLY TWITTER MOBILE APPS

Twitter- the highly popular online and social-networking service where users post and read tweets, which are of 140 character length. This social networking giant was created in March 2006....