Now facebook introduced new “Facebook groups app” on 18 November
Facebook groups app for facebook lovers:
Peoples use facebook to keep contact with friends and family who may live far from them or not. To keep in contact with friends...
iOS Malware – YiSpecter
iOS Malware- YiSpecter
Cybersecurity firm Palo Alto has recently discovered a new Malware in Apple named YiSpecter .I don't know what's wrong is going on with Apple as this is...
VDI Deployment Mistakes
Firstly, we should know about VDI. It stands for Virtual Desktop Infrastructure. It is a practice which hosts desktop operating system within a Virtual Machine (VM) running on a...
WikiLeaks to publish the content from CIA’s Director Email
You must have visited the website of WikiLeaks, the non-profit and transparency organisation to read about the leaks and top secrets of this world.
And now Julian Assange, the founder...
Now BackUp Your WhatsApp Data to Google Drive
BackUp Your WhatsApp Data
The first thing comes to my mind when I think about losing my phone is “Oh! No I will lose all my data all the conversation”...
Dual Boot Kali 2.0 and Microsoft Windows 8, 8.1, 10
Dual Boot Kali 2.0 and Microsoft Windows 8, 8.1, 10
The most popular Kali Linux was released on last week at DefCon 23 in Las Vegas.Kali is successor of Backtrack...
Stage fright Bug 2.0: All Android Devices are Vulnerable to the Bugs
Once again the Stage fright vulnerability is back, two new Android Stage fright vulnerabilities are recently disclosed.
This time with some new tricks, an attacker can hack the Android Phone...
TalkTalk Cyber-attack: Another teenager arrested in London
Another teenager arrested in London.
This time the British police arrested a 16 year old boy from Feltham in West London in case of TalkTalk data breach.
On Monday, Metropolitan Police...
Apple refused to unlock the iPhone on the enforcement of U.S Federal Judge
Once again the tech giant Apple has proved that how much they are concerned about the privacy of its users, and they will never break the users’ security for...
Basic Exploits : Stack Operations
Note: Hacking is not a joke so please keep patience and learn it step by step.
Stack Operations
First and the most important topic to learn the basics of Exploits is...
9 Million Google play users infected by Adware (Android Virus)
Adware (Android virus)
Adware is a type of malware that automatically shows advertisement, banner or pop up on user's mobile or computer. Adware or we can say these type android...
Mozilla Placing High Bandwidth Tor Middle Relays
Mozilla Placing High Bandwidth Tor Middle Relays
Mozilla Placing High Bandwidth Tor Middle Relays to add more secure anonymity in Firefox. Tor and Mozilla working together to provide a more...
Basic Linux exploits: Function Calling Procedure
Note: Hacking is not a joke so please keep patience and learn it step by step.
Note: Before reading this post you must read :
Learn hacking...
Mac Malware: Time to test Apple’s Security
Last quarter shows an interestingly spike in malware activity that targeted Mac users only. New samples in the 1st 3 months of this year are nearly equal to the...
WannaCry ransomware attack: Largest Ransomware Attack In The History
By now, we are sure that you have heard something about wannacry ransomware. There may be a lot of questions in your mind such as What is wannacry ?...
Yahoo! Launched its own Web Application Security Scanner
Yahoo! Launched its own Web Application Security Scanner
Gryffin, the web application security scanner by Yahoo! is now open source for the purpose to improve the safety on the web...
Smartphones with a ‘kill switch’ to prevent from thefts
New software 'kill switch' to thwart thefts:
Microsoft & Google Follows Apple Security Software Which Render handset Unusable after Reported Stolen
Microsoft and google said that phones using their operating systems...
How To Crack Web Form Passwords Using Hydra With Burpsuite In Kali Linux
In our previous article How To Crack Password Using Hydra In Kali Linux , we have discussed about THC Hydra- A tool for Online Password attacks. In this tutorial we will discuss...
Loki Got an upgrade – Loki Botnet new varient Detected
Loki Botnet (Malware) works in the same way as Marvel's Villen cum hero works (Trick the user and steal the information). Loki botnet, A bot (malware) which was detected...
Step-by-Step Guide to Install Kali 2.0 Linux in VMware workstation 11
The New Kali 2.0 codename as Kali Sana, is an open-source penetration testing platform having pre-installed hundreds of Hacking ,Reverse Engineering, Forensics and Penetration Testing tools. Kali 2.0 was redesigned...
China Helped U.S.A: China Arrested Hackers on the Request of U.S Government.
China Arrested Hackers on the Request of U.S Government
The things happen in movies can actually happen in the real life too. The recent action of China reminds me of...
Three Vulnerabilities Of Starbucks Website: Credit Card details in Risk
The famous coffeehouse Starbucks is undoubtedly the best in its class and taste but registering yourself on the website of Starbucks could be dangerous. The registered accounts and credit...
US Intelligence Chief Hacked by a teen
The email of US Intelligence Chief Hacked!
The same teenager who hacked the AOL email of CIA Director John Brennan back in October last year has now hacked into personal...
ProxyHam : Anonymously Access Wi-Fi from 2.5-Miles Away
Here we will discuss How to Anonymously Access Wi-Fi from 2.5 miles away using Dubbed Proxyham. It's always the matter of discuss when anonymity is in the frame. In...
Recently Whatsapp Banned users for using Whatsapp Plus Application
OOOOhh cut off with friends due to using watsapp plus :(
i missed my friends , my watsapp plus stop working :`(
...
How to hack windows password
How to hack windows password
Change your password if you Forget it
Hello friends today we learn how to change your password if your account or change windows password is locked/you forget your password.At that...