How To Crack Web Form Passwords Using Hydra With Burpsuite In Kali Linux
In our previous article How To Crack Password Using Hydra In Kali Linux , we have discussed about THC Hydra- A tool for Online Password attacks. In this tutorial we will discuss...
How to Choose a Router for Your Business
If you think that choosing a router for your business is an easy task, you have no idea how wrong you are. It is not like choosing a standard...
WordPress XML-RPC: Brute Force Amplification Attack
It is always interesting to hear about the bugs in world’s most famous systems, this time it is WordPress. Yes the world’s most famous content management system is vulnerable...
What is Ransomware and How it works?
Attackers use ransomware to get ransom from its victims. In other words, ransomware is a malicious program or software to block user access on their own system or encrypt...
Managing Kali Linux Services
Managing Kali Linux Services
Kali Linux is a specialized Linux distribution aimed to test Network. The default Kali installation comes with several services preinstall like SSH, HTTP, MySQL, etc. These...
Droid Turbo new update started rolling out
Droid Turbo new update started rolling out : New updates brings latest security patches and some performance related improvement to Droid Turbo, recently Verizon has stated rolling out a...
US Intelligence Chief Hacked by a teen
The email of US Intelligence Chief Hacked!
The same teenager who hacked the AOL email of CIA Director John Brennan back in October last year has now hacked into personal...
How to make sure a file is safe or threat? | How to do...
Today, we will discuss how to find, a file is safe or a threat for your system?
Or we can say, how to do malware and threat analysis?
Watch Video on...
Obama Encryption Policy: Are they violating the definitions of Security, Privacy and Encryption?
Obama Encryption Policy
As the consequences of exposure that Edward Snowden made about NSA, the citizens of USA are now demanding for more transparent security.
From last some days citizens of...
Now BackUp Your WhatsApp Data to Google Drive
BackUp Your WhatsApp Data
The first thing comes to my mind when I think about losing my phone is “Oh! No I will lose all my data all the conversation”...
Format string exploits
Format string exploits became public in late 2000. It is easy to find errors in format string in comparison of buffer overflows. Once errors are spotted, they are usually...
WannaCry ransomware attack: Largest Ransomware Attack In The History
By now, we are sure that you have heard something about wannacry ransomware. There may be a lot of questions in your mind such as What is wannacry ?...
$ 500,000 Reward For Impact Team Information :Ashley Madison Hack Has Become A Reason...
In our previous article Finally Hackers Dumped Stolen Ashley Madison Data Onto Dark Web we told you why the group of hackers dumped Ashley Madison's Data on dark web which includes...
WikiLeaks to publish the content from CIA’s Director Email
You must have visited the website of WikiLeaks, the non-profit and transparency organisation to read about the leaks and top secrets of this world.
And now Julian Assange, the founder...
Snapchat’s Security break by Steven Hickson
It's all about little bit of simple programming and computer graphics . Snapchat's Security broke by Steven Hickson a programmer as well as a hacker or you can say that every...
Explore and Search Exploit in Metasploit
Metasploit having a big name, when we talking about security. Metasploit was written in Perl as a portable network tool, In 2007 the Metasploit Freamwork has completely rewritten in...
Instagram Hacked: A security researcher hacked into the servers of Instagram
Instagram Hacked!
Someone just hacked into the servers of Instagram, showing the most secure mechanisms also have bugs.
But you don’t try to do anything like this because even reporting the...
18,000 malicious apps are stealing the text messages from your android device
Knowing that there are number of Android apps that are stealing the copies of the text messages received or sent to your device may leave you a bit insecure,...
Yahoo! Launched its own Web Application Security Scanner
Yahoo! Launched its own Web Application Security Scanner
Gryffin, the web application security scanner by Yahoo! is now open source for the purpose to improve the safety on the web...
StageFright 2.0 Fixed: Google released an OTA for Nexus Devices.
StageFright 2.0 Fixed
Few days back, the researchers warned google of the new Stage Fright Bug. This bug affected more than a billion devices that are running on Android OS.
This...
How to hack windows password
How to hack windows password
Change your password if you Forget it
Hello friends today we learn how to change your password if your account or change windows password is locked/you forget your password.At that...
Mac Malware: Time to test Apple’s Security
Last quarter shows an interestingly spike in malware activity that targeted Mac users only. New samples in the 1st 3 months of this year are nearly equal to the...
PentestBox: A Portable Penetration Testing Distribution for Windows Environments
Download SourceForge Download Torrent
PentestBox is a...
iOS Malware – YiSpecter
iOS Malware- YiSpecter
Cybersecurity firm Palo Alto has recently discovered a new Malware in Apple named YiSpecter .I don't know what's wrong is going on with Apple as this is...
Hack WPA2 Encrypted Wi-Fi Networks using Aircrack-ng
Hack WPA2 Encrypted Wi-Fi Networks using Aircrack-ng | Kali-Linux
Hello friend ,In this article I will demonstrate how to crack or hack some one's WiFi Network just in simple steps...
Apple Removed malicious Apps from App Store: Apps were installing the Root Certificates to...
Apple has recently removed some malicious apps from its App Store. According to Apple there were some apps on the App store that have the ability to negotiate encrypted...