Bitport Review : Download torrents to your cloud and play them online

Bitport Review : Download torrents to your cloud and play them online

Bitport.io review :Most of the people here use torrent to download movies, games , series , software and much more. But there is a question is it safe to...
iphone 6s Malware

iOS Malware – YiSpecter

0
iOS Malware- YiSpecter Cybersecurity firm Palo Alto has recently discovered a new Malware in Apple named YiSpecter .I don't know what's wrong is going on with Apple as this is...
An application to send Encrypted message

How to send encrypted message using softwares or applications??

1
How to Send Encrypted Message?? In our previous post Encryption and Decryption ,we told you the meaning and need of encryption and decryption. After that you may want to know...
Step-by-Step Guide to Install Kali 2.0 Linux in VMware workstation 11

Step-by-Step Guide to Install Kali 2.0 Linux in VMware workstation 11

0
The New Kali 2.0 codename as Kali Sana, is an open-source penetration testing platform having pre-installed hundreds of Hacking ,Reverse Engineering, Forensics and Penetration Testing tools. Kali 2.0 was redesigned...
Ten hilarious facts that only programmers can understand

Exploiting buffer overflows using command line

0
After reading our previous post: Next step moving towards exploit:Finding the return address ,it's time to do some command line exploits. So this post is regarding Exploiting buffer...
Hackers war

China Helped U.S.A: China Arrested Hackers on the Request of U.S Government.

0
China Arrested Hackers on the Request of U.S Government   The things happen in movies can actually happen in the real life too. The recent action of China reminds me of...
best compiler for c / c++

Basic Linux Exploits:Make your Pc more secure

0
Basic Linux Exploits:Make your Pc more secure and learn the basics of computer world Why study Exploits? Before learning exploits ,one should know about vulnerability.What does it means in the world...

Apple Removed malicious Apps from App Store: Apps were installing the Root Certificates to...

0
Apple has recently removed some malicious apps from its App Store. According to Apple there were some apps on the App store that have the ability to negotiate encrypted...
Baidu SDK Bug

Baidu SDK Bug: Puts over 100 Million devices at risk

0
Researchers recently found that Baidu’s software development kit (SDK) is vulnerable to a bug that can allow the hacker to gain the backdoor like access to a user’s device....

Shocking: AdBlock has been Sold to an Anonymous Buyer

0
It might be a bit shocking for you but TRUE!!! The most popular ad blocking extension Ad block has been sold. And more scandalous news is the buyer of the...
Microsoft's Windows 10 disables pirated games and illegal hardware

Microsoft’s Windows 10 disables pirated games and illegal hardware

0
Every one is exited to get free Windows 10 upgrade  because of its features , compatibility , user interface and other good features, without knowing why they make it...
Shocking secrets about Ashley Madison

Shocking secrets about Ashley Madison: Women were actually not using the website

0
The hacked data of Ashley Madison website is been a reason for many criminal activities since it’s data is dumped on to the dark web (also known as deep...

How to hack windows password

0
How to hack windows password Change your password if you Forget it Hello friends today we learn how to change your password if your account or change windows password is locked/you forget your password.At that...

Google is going to mandate the Full Disk Encryption by default for devices with...

0
Last year when Google launched Android Lollipop 5.0, Google wanted to make the full disk encryption mandatory, but due to some reasons the idea didn’t work. But this time with...

Google reveals three Apple OS X zero-day flaws

0
Once again Google proved that they have strong security team which can expose not only Microsoft vulnerabilities but Apple OS X can also stand in the same category. Google expose...
WhatsApp vCard vulnerable

Security Flaw found in WhatsApp : 200 million users are at Risk

0
Security Flaw found in WhatsApp: 200 million users are at Risk     You will be shocked to know that about 200 million users of the world’s most famous instant messaging service...
whatsapp vs whatsapp plus

Recently Whatsapp Banned users for using Whatsapp Plus Application

0
OOOOhh cut off with friends due to using watsapp plus :( i missed my friends , my watsapp plus stop working :`( ...

Stone tether smallest tracking device finds your lost items

0
Stone tether smallest tracking device: Technology has made life easier if you fail to remember something. A new device is becoming to discover your lost items. Its name is stone...

WikiLeaks to publish the content from CIA’s Director Email

0
You must have visited the website of WikiLeaks, the non-profit and transparency organisation to read about the leaks and top secrets of this world. And now Julian Assange, the founder...
Stage fright Bug 2.0: All Android Devices are Vulnerable to the Bugs

Stage fright Bug 2.0: All Android Devices are Vulnerable to the Bugs

0
Once again the Stage fright vulnerability is back, two new Android Stage fright vulnerabilities are recently disclosed. This time with some new tricks, an attacker can hack the Android Phone...
Attackers are using facebook messenger to spread Locky Ransomware

Attackers are using facebook messenger to spread Locky Ransomware

0
Any Facebook message with an image file (.svg format) send by your friend can be a Locky Ransomware file, so just avoid clicking it. What is Locky Ransomware? Locky is ransomware released...
Malware analysis sandboxing

What is Sandboxing and How it works?

0
In this article, we will discuss sandboxing, how it works and list of free sandboxing environments, etc. Hybrid analysis, Malware analysis, and Threat analysis, they all use the same technology...
Kill Switch Software

Smartphones with a ‘kill switch’ to prevent from thefts

0
New software 'kill switch' to thwart thefts: Microsoft & Google Follows Apple Security Software Which Render handset Unusable after Reported Stolen Microsoft and google said that phones using their operating systems...

Kali Linux Rolling Edition updated with the latest patches

0
The most popular Kali Linux was released on 2015 at DefCon 23 in Las Vegas. Kali is successor of Backtrack based on Debian Jessie,distribution, includes many popular penetration...
WordPress XMLPRC: Brute Force Amplification Attack

WordPress XML-RPC: Brute Force Amplification Attack

0
It is always interesting to hear about the bugs in world’s most famous systems, this time it is WordPress. Yes the world’s most famous content management system is vulnerable...
Exploit Shell code using Command-line

Exploit using shell code from command line

0
After reading our previous post:Exploiting buffer overflows using command line it's time to do Exploit Shell code using Command-line but I think you do want to clear your doubt...