19 C
Delhi
Monday, February 18, 2019

Now facebook introduced new “Facebook groups app” on 18 November

Facebook groups app for facebook lovers: Peoples use facebook to keep contact with friends and family who may live far from them or not. To keep in contact with friends...

Stone tether smallest tracking device finds your lost items

Stone tether smallest tracking device: Technology has made life easier if you fail to remember something. A new device is becoming to discover your lost items. Its name is stone...
Shocking secrets about Ashley Madison

Shocking secrets about Ashley Madison: Women were actually not using the website

The hacked data of Ashley Madison website is been a reason for many criminal activities since it’s data is dumped on to the dark web (also known as deep...
Adware,, Android Virus, Android malware

9 Million Google play users infected by Adware (Android Virus)

Adware (Android virus) Adware is a type of malware that automatically shows advertisement, banner or pop up on user's mobile or computer. Adware or we can say these type android...
final Wifi crack

Hack WPA2 Encrypted Wi-Fi Networks using Aircrack-ng

Hack  WPA2 Encrypted Wi-Fi Networks using Aircrack-ng | Kali-Linux Hello friend ,In this article I will demonstrate how to crack or hack some one's WiFi Network just in simple steps...

15 Year old Boy Arrested as the suspect of TalkTalk cyber Attack

After the data breach of largest phone and broadband provider in UK, police for the first time has taken some action. Last week TalkTalk the biggest Phone and Broadband provider...
Yahoo! Web Application Security Scanner

Yahoo! Launched its own Web Application Security Scanner

Yahoo! Launched its own Web Application Security Scanner   Gryffin, the web application security scanner by Yahoo! is now open source for the purpose to improve the safety on the web...
ISIS hackers hacked 54,000 twitter accounts

ISIS hackers hacked 54,000 twitter accounts: Publishing the secret information of CIA Head

The year has been bad so far for CIA and other US agencies, now this time ISIS hackers hacked 54,000 twitter accounts which also include the accounts of FBI...

USB Killer 2.0 : It can destroy your system in just some seconds

Do you remember Killer USB? It is about the new version of Killer USB, this time with tremendous powers. Let’s talk a bit about the previous version of Killer USB,...

End-To-End Encryption is now on WHATSAPP

On Tuesday,Whatsapp's founder Jan Koum disclosed that all the messages and call which are done through Whatsapp are fully encrypted.Whatsapp is now lot more secure. All user those who want...

Now use Facebook anonymously via Tor networks: good news for Tor users

Now use Facebook anonymously: Facebook is a most popular social network in world. Here is good news for Facebook lovers, who want to keep secret their identity on internet. Identity...
The Pirate Bay Four

“The Pirate Bay Four” Acquitted In Criminal Copyright Case

The Founders of Pirate Bay - Gottfrid Svartholm, Fredrik Neij, Peter Sunde and Carl Lundström were acquitted (Free from charge) by a Belgian court Thursday of charges alleging criminal copyright infringement and...
An application to send Encrypted message

How to send encrypted message using softwares or applications??

How to Send Encrypted Message?? In our previous post Encryption and Decryption ,we told you the meaning and need of encryption and decryption. After that you may want to know...
Bitport Review : Download torrents to your cloud and play them online

Bitport Review : Download torrents to your cloud and play them online

Bitport.io review :Most of the people here use torrent to download movies, games , series , software and much more. But there is a question is it safe to...

CIA Director’s hacked email: Pak uses militants to counter India’s Influence in Afghanistan

Last week WikiLeaks started publishing the documents from the CIA Director’s hacked email revealing some top secrets. A set of document of released by WikiLeaks says that Pakistan uses...
Stage fright Bug 2.0: All Android Devices are Vulnerable to the Bugs

Stage fright Bug 2.0: All Android Devices are Vulnerable to the Bugs

Once again the Stage fright vulnerability is back, two new Android Stage fright vulnerabilities are recently disclosed. This time with some new tricks, an attacker can hack the Android Phone...
NETGEAR Router Exploit

NETGEAR Router Exploit: Critical Bug in NETGEAR Router

Do you use NETGEAR Router, then have a look at it. NETGEAR Routers are once again vulnerable to the DNS Monitoring. A security researcher discovered that there is a serious...
Anonymity buffercode

How to surf internet Anonymously

Hello friends this  post is about how to hide your machine IP for surfing internet Anonymously. To read this may bore you but keep patience because it is important....

Finally Hackers Dumped Stolen Ashley Madison Data Onto Dark Web

Ashley Madison, the largest cheating website with the tag line " Life is short. Have an affair " was hacked by the group of hackers called itself The Impact Team . And...
Baidu SDK Bug

Baidu SDK Bug: Puts over 100 Million devices at risk

Researchers recently found that Baidu’s software development kit (SDK) is vulnerable to a bug that can allow the hacker to gain the backdoor like access to a user’s device....
Malware analysis sandboxing

What is Sandboxing and How it works?

In this article, we will discuss about sandboxing, how it works and list of free sandboxing environment etc. Hybrid analysis, Malware analysis and Threat analysis, they all use the same...
Ten hilarious facts that only programmers can understand

Exploiting buffer overflows using command line

After reading our previous post: Next step moving towards exploit:Finding the return address ,it's time to do some command line exploits. So this post is regarding Exploiting buffer...
AVG’s New Privacy Policy: Your data will be sold to advertisers

AVG will behave as Virus : AVG’s New Privacy Policy, Your data will be...

What is the first thing you do while setting up your computer? Is it installing the free antivirus or Internet security software? I guess yes, this is the first thing...
BBM Blackberry new privacy : timer and restrict message

BBM BlackBerry now features timer just like Snapchat

Here is a good news for all BBM ( BlackBerry Messenger) Lovers, new Privacy features update which is live by BBM BlackBerry Application for all Android, ios or windows device....
Basic Linux Exploits : Moving towards exploit

Basic Linux Exploits: Moving towards exploits

Note: Hacking is not a joke so please keep patience and learn it step by step. If you have read all our previous posts , you are ready to exploits the...

Shocking: AdBlock has been Sold to an Anonymous Buyer

It might be a bit shocking for you but TRUE!!! The most popular ad blocking extension Ad block has been sold. And more scandalous news is the buyer of the...