41.8 C
Delhi
Thursday, May 29, 2025

CamScanner: Google store removed the app as it contains malware

0
Camscanner is scanner application available in google play and app store. Recently, it is found as a front for disseminating malware on gadgets and has been expelled by Google...
best compiler for c / c++

Basic Linux Exploits:Make your Pc more secure

0
Basic Linux Exploits:Make your Pc more secure and learn the basics of computer world Why study Exploits? Before learning exploits ,one should know about vulnerability.What does it means in the world...
WhatsApp vCard vulnerable

Security Flaw found in WhatsApp : 200 million users are at Risk

0
Security Flaw found in WhatsApp: 200 million users are at Risk     You will be shocked to know that about 200 million users of the world’s most famous instant messaging service...
exploit search in metasploit

Explore and Search Exploit in Metasploit

0
Metasploit having a big name, when we talking about security. Metasploit was written in Perl as a portable network tool, In 2007 the Metasploit  Freamwork has completely rewritten in...
Malware analysis sandboxing

What is Sandboxing and How it works?

0
In this article, we will discuss sandboxing, how it works and list of free sandboxing environments, etc. Hybrid analysis, Malware analysis, and Threat analysis, they all use the same technology...
wannacry ransomware cyber attack

WannaCry ransomware attack: Largest Ransomware Attack In The History

0
By now, we are sure that you have heard something about wannacry ransomware. There may be a lot of questions in your mind such as What is wannacry ?...
Mac Malware: Time to test Mac security

Mac Malware: Time to test Apple’s Security

0
Last quarter shows an interestingly spike in malware activity that targeted Mac users only. New samples in the 1st 3 months of this year are nearly equal to the...
Adware,, Android Virus, Android malware

9 Million Google play users infected by Adware (Android Virus)

0
Adware (Android virus) Adware is a type of malware that automatically shows advertisement, banner or pop up on user's mobile or computer. Adware or we can say these type android...
Rockstar Games Launcher, GTA

Download the new Rockstar Games Launcher and get GTA: San Andreas free!

0
Here we go again! Rockstar Games has released its PC launcher just if you don't have an excessive number of on your PC as of now. This time, be that...
Basic Linux Exploits : Moving towards exploit

Basic Linux Exploits: Moving towards exploits

0
Note: Hacking is not a joke so please keep patience and learn it step by step. If you have read all our previous posts , you are ready to exploits the...
ransomware

What is Ransomware and How it works?

0
Attackers use ransomware to get ransom from its victims. In other words, ransomware is a malicious program or software to block user access on their own system or encrypt...
DemonBot, Botnet

Demonbot is on rising | A New Botnet

0
As security is getting stronger so hackers are getting more stronger. Once a loophole is closed by Operating systems or any vendors then hackers find out another way to breach...
crack password using hydra and burpsuit

How To Crack Web Form Passwords Using Hydra With Burpsuite In Kali Linux

0
In our previous article How To Crack Password Using Hydra In Kali Linux , we have discussed about THC Hydra- A tool for Online Password attacks. In this tutorial we will discuss...
Hack Attempts on Dropbox:

Is Dropbox safe against Ransomware and Hacks?

0
Imagine backing up your sensitive data on Dropbox and one fine morning, finding out that your password has been leaked or you are locked out of your account and...
Android Malware, Android Virus, Timpdoor, Android threat, Android security, Android

SMISHING on Android devices | Android Malware (TimpDoor)

0
Timpdoor is the recent Android malware that has been discovered by McAfee mobile researcher's team that turns mobile into a backdoor. This Android malware is spreading through smishing attack, and...

How to make sure a file is safe or threat? | How to do...

0
Today, we will discuss how to find, a file is safe or a threat for your system? Or we can say, how to do malware and threat analysis? Watch Video on...

Kali Linux Rolling Edition updated with the latest patches

0
The most popular Kali Linux was released on 2015 at DefCon 23 in Las Vegas. Kali is successor of Backtrack based on Debian Jessie,distribution, includes many popular penetration...
metasploit Unleashed

Explore into the Metasploit ( a Ultimate Hackers Tool)

0
  Metasploit is a complete and a Ultimate Security tool that provides information about Computer Security Vulnerabilities and also use in penetration testing .It was develop by HD Moore in...
Vulnerability in PayPal user authentication system

Vulnerability in PayPal user authentication system

0
It's always a matter of attraction when money is in the frame of attack. So It's time to get into the users PayPal account.. Paypal provides online / ebay...

New Nintendo accessory can trick you into exercising!

0
Nintendo showed off a new Switch accessory that will trick you into exercising!  Nintendo released another video yesterday late at night, titled "First look at a new experience for Nintendo...

An Almost Impossible To Detect Phishing Attack Using Punycode

0
In our previous article How to secure you account from phishing page, we discussed about how to create and detect whether a page is a phishing page or original...

A new Zero-Day vulnerability in recently patched Flash Player

0
It seems to be no benefits of fixing the issues in its latest patch that was released by Flash Player yesterday. Adobe is trying its best to make the Flash...
Attackers are using facebook messenger to spread Locky Ransomware

Attackers are using facebook messenger to spread Locky Ransomware

0
Any Facebook message with an image file (.svg format) send by your friend can be a Locky Ransomware file, so just avoid clicking it. What is Locky Ransomware? Locky is ransomware released...
Exploit Shell code using Command-line

Exploit using shell code from command line

0
After reading our previous post:Exploiting buffer overflows using command line it's time to do Exploit Shell code using Command-line but I think you do want to clear your doubt...
How to Install Kali without any Problem

Complete Guidance to Install Kali linux in Dual Boot Mode without any Problem

2
Before start Complete Guidance to Install Kali linux in Dual Boot Mode without any Problem remember it's slogan:- The Quiter you become ,the more you are able to hear Do you...
Bacic Exploits : Stack Operations

Basic Exploits : Stack Operations

0
Note: Hacking is not a joke so please keep patience and learn it step by step. Stack Operations First and the most important topic to learn the basics of Exploits is...