Whatsapp data in cloud

Now BackUp Your WhatsApp Data to Google Drive

0
BackUp Your WhatsApp Data   The first thing comes to my mind when I think about losing my phone is “Oh! No I will lose all my data all the conversation”...

Apple refused to unlock the iPhone on the enforcement of U.S Federal Judge

0
Once again the tech giant Apple has proved that how much they are concerned about the privacy of its users, and they will never break the users’ security for...
Malware analysis sandboxing

What is Sandboxing and How it works?

0
In this article, we will discuss sandboxing, how it works and list of free sandboxing environments, etc. Hybrid analysis, Malware analysis, and Threat analysis, they all use the same technology...

End-To-End Encryption is now on WHATSAPP

0
On Tuesday,Whatsapp's founder Jan Koum disclosed that all the messages and call which are done through Whatsapp are fully encrypted.Whatsapp is now lot more secure. All user those who want...
IOS 9 Content Blockers: 1Blocker and Blocker

IOS 9 Content Blockers: 1Blocker and Blocker

0
Apple will now support ad blocking. The new operating system iOS9 launching on Wednesday is dignified to change the interaction of users with the web on mobile and iPad....
SQL Injection with buffercode

SQL INJECTION BY VARIOUS WAYS

0
SQL INJECTION BY VARIOUS WAYS INTRODUCTION TO SQL INJECTION The most easiest way to hack an site is hacking it by SQL injection. SQL Injection based on the vulnerabilities of an...
Dual Boot Kali and windows 10

Dual Boot Kali 2.0 and Microsoft Windows 8, 8.1, 10

0
Dual Boot Kali 2.0 and Microsoft Windows 8, 8.1, 10 The most popular Kali Linux was released on last week at DefCon 23 in Las Vegas.Kali is successor of Backtrack...
Baidu SDK Bug

Baidu SDK Bug: Puts over 100 Million devices at risk

0
Researchers recently found that Baidu’s software development kit (SDK) is vulnerable to a bug that can allow the hacker to gain the backdoor like access to a user’s device....
c program Machine code

How to use Debugger tool objdump in Linux

0
Debugger Tool Objdump in Linux Debugger Tool objdump: C feel more familiar and C compiler exist in every operating system .Basically Linux is a free operating system that every has...
Yahoo! Web Application Security Scanner

Yahoo! Launched its own Web Application Security Scanner

0
Yahoo! Launched its own Web Application Security Scanner   Gryffin, the web application security scanner by Yahoo! is now open source for the purpose to improve the safety on the web...

Shocking: AdBlock has been Sold to an Anonymous Buyer

0
It might be a bit shocking for you but TRUE!!! The most popular ad blocking extension Ad block has been sold. And more scandalous news is the buyer of the...
Let’s Encrypt released a Beta version

Let’s Encrypt: Free SSL Certificate Install by 1 Million websites

0
Let’s Encrypt published 1 million free Transport Layer Security SSL Certificates to webmasters who want to secure their connection between their users and domains and has achieved a vast...
log management

EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK

0
EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK What’s in the LOG? The information you need to answer Who’s attacking us today? and How did...
encryption and decryption

How to use backtrack

17
Note: Instead of using backtrack use Kali Linux | Rebirth of BackTrack, the Penetration Testing Before you start Before we start playing with safty tools follow the following steps :- Download btr5...

Apple Removed malicious Apps from App Store: Apps were installing the Root Certificates to...

0
Apple has recently removed some malicious apps from its App Store. According to Apple there were some apps on the App store that have the ability to negotiate encrypted...
Hacking with Android Smartphone using zANTI 2

Hacking with Android Smartphone using zANTI2

2
Download zANTI 2.2(Apk) Hacking with Android Smartphone using zANTI2 zANTI2 is a Network Analysis and penetration suit developed by ZImperium family as a software developer and researcher, the name zANTI2 comes...
whatsapp vs whatsapp plus

Recently Whatsapp Banned users for using Whatsapp Plus Application

0
OOOOhh cut off with friends due to using watsapp plus :( i missed my friends , my watsapp plus stop working :`( ...
Pixabay Sensitive Documents

Managing the Safety and Security of Sensitive Documents

0
The digital era has made it effortless and more efficient to conduct business than ever before, be it in a local space or on a largely worldwide scale. In...

18,000 malicious apps are stealing the text messages from your android device

0
Knowing that there are number of Android apps that are stealing the copies of the text messages received or sent to your device may leave you a bit insecure,...
ProxyHam : Anonymously Access Wi-Fi from 2.5-Miles Away

ProxyHam : Anonymously Access Wi-Fi from 2.5-Miles Away

0
Here we will discuss How to Anonymously Access Wi-Fi from 2.5 miles away using Dubbed Proxyham. It's always the matter of discuss when anonymity is in the frame. In...

How to hack windows password

0
How to hack windows password Change your password if you Forget it Hello friends today we learn how to change your password if your account or change windows password is locked/you forget your password.At that...
Stage fright Bug 2.0: All Android Devices are Vulnerable to the Bugs

Stage fright Bug 2.0: All Android Devices are Vulnerable to the Bugs

0
Once again the Stage fright vulnerability is back, two new Android Stage fright vulnerabilities are recently disclosed. This time with some new tricks, an attacker can hack the Android Phone...

Finally Hackers Dumped Stolen Ashley Madison Data Onto Dark Web

0
Ashley Madison, the largest cheating website with the tag line " Life is short. Have an affair " was hacked by the group of hackers called itself The Impact Team . And...

How to make sure a file is safe or threat? | How to do...

0
Today, we will discuss how to find, a file is safe or a threat for your system? Or we can say, how to do malware and threat analysis? Watch Video on...
Next step towards exploit : finding the return address

Next step towards exploit : finding the return address

0
Hey friends , I think it's the time to take next step towards exploit after reading our all previous posts . In this tutorial you will learn about :...
facebook verification page has bug

Facebook verification page has bug found by team Buffercode

5
Note: I already send report for this bug , I  hope Team Facebook will change their algorithm for this page.  New Bug has found by team Buffercode in Facebook It's always...