29.4 C
Delhi
Wednesday, July 2, 2025

A new Zero-Day vulnerability in recently patched Flash Player

0
It seems to be no benefits of fixing the issues in its latest patch that was released by Flash Player yesterday. Adobe is trying its best to make the Flash...
Anonymity buffercode

How to surf internet Anonymously

1
Hello friends this  post is about how to hide your machine IP for surfing internet Anonymously. To read this may bore you but keep patience because it is important....
ransomware

What is Ransomware and How it works?

0
Attackers use ransomware to get ransom from its victims. In other words, ransomware is a malicious program or software to block user access on their own system or encrypt...
Attackers are using facebook messenger to spread Locky Ransomware

Attackers are using facebook messenger to spread Locky Ransomware

0
Any Facebook message with an image file (.svg format) send by your friend can be a Locky Ransomware file, so just avoid clicking it. What is Locky Ransomware? Locky is ransomware released...
Basic Linux Exploits : Moving towards exploit

Basic Linux Exploits: Moving towards exploits

0
Note: Hacking is not a joke so please keep patience and learn it step by step. If you have read all our previous posts , you are ready to exploits the...
Hackers war

China Helped U.S.A: China Arrested Hackers on the Request of U.S Government.

0
China Arrested Hackers on the Request of U.S Government   The things happen in movies can actually happen in the real life too. The recent action of China reminds me of...
Obama Encryption Policy

Obama Encryption Policy: Are they violating the definitions of Security, Privacy and Encryption?

0
Obama Encryption Policy   As the consequences of exposure that Edward Snowden made about NSA, the citizens of USA are now demanding for more transparent security. From last some days citizens of...
The Data You Keep In Your Mobile Is Not Secure: Pre-Installed Spywares in Smartphones

The Data You Keep In Your Mobile Is Not Secure: Pre-Installed Spywares in Smartphones

0
If you think that the data you keep in your phone is confidential then you must read this. A report claims that some smartphones are coming with the pre-installed...
Bitport Review : Download torrents to your cloud and play them online

Bitport Review : Download torrents to your cloud and play them online

Bitport.io review :Most of the people here use torrent to download movies, games , series , software and much more. But there is a question is it safe to...
android banking trojan

Android Banking Trojan Hiding In Apps Under Different Names: Targeting over 420 apps worldwide

0
Beware if you recently have installed any funny video application from Google Play Store as it may contain android banking Trojan. Most of the people love to watch funny videos...

ISIS Hacker Arrested In Malaysia: US Military Data Hacked By ISIS Hacker

0
A Kosovo citizen is arrested by Malaysian Authorities in the charges of computer hacking and providing the personal data of U.S. Military members to the Islamic State terrorist group...
Install Honeypot in Kali-4

How to Install Honeypot on Kali Linux

0
In this article we will show how to install Honeypot in Kali Linux. The Pentbox is Security suite that can be use for penetration testing to perform various operations. The...
Ashley madison Hacked, 500,000 Reward For Impact Team Information

$ 500,000 Reward For Impact Team Information :Ashley Madison Hack Has Become A Reason...

0
In our previous article Finally Hackers Dumped Stolen Ashley Madison Data Onto Dark Web we told you why the group of hackers dumped Ashley Madison's Data on dark web which includes...

WikiLeaks to publish the content from CIA’s Director Email

0
You must have visited the website of WikiLeaks, the non-profit and transparency organisation to read about the leaks and top secrets of this world. And now Julian Assange, the founder...
outlook hacked

Hackers Attacked Microsoft Outlook Web App to steal Login Credentials

0
Hackers Attacked Microsoft Outlook Web App to steal Login Credentials   Researchers have recently founded a hazardous Backdoor in Microsoft’s Outlook Web Application, which allows the hackers to steal e-mail and...
WhatsApp vCard vulnerable

Security Flaw found in WhatsApp : 200 million users are at Risk

0
Security Flaw found in WhatsApp: 200 million users are at Risk     You will be shocked to know that about 200 million users of the world’s most famous instant messaging service...
Mozilla Placing High Bandwidth Tor Middle Relays

Mozilla Placing High Bandwidth Tor Middle Relays

0
 Mozilla Placing High Bandwidth Tor Middle Relays  Mozilla Placing High Bandwidth Tor Middle Relays to add more secure anonymity in Firefox. Tor and Mozilla working together to provide a more...
Three Vulnerabilities Of Starbucks Website: Credit Card details in Risk

Three Vulnerabilities Of Starbucks Website: Credit Card details in Risk

0
The famous coffeehouse Starbucks is undoubtedly the best in its class and taste but registering yourself on the website of Starbucks could be dangerous. The registered accounts and credit...
encryption and decryption

How to use backtrack

17
Note: Instead of using backtrack use Kali Linux | Rebirth of BackTrack, the Penetration Testing Before you start Before we start playing with safty tools follow the following steps :- Download btr5...
Trojanized Adware

The Trojanized Adware: It can automatically install apps to your Android Device

0
What sort of apps do you install on your Android Smartphone? I hope the trusted ones. Now, what if someone installs a malicious app on your smartphone without your permission? It...

Radio Wave Hack: It allows the hacker to control your phone from 16 feet...

0
Every day we get to know about a different hack and every hack has its own dependencies and capabilities. Now, this is crazy. Security researchers have discovered a new hack...
Next step towards exploit : finding the return address

Next step towards exploit : finding the return address

0
Hey friends , I think it's the time to take next step towards exploit after reading our all previous posts . In this tutorial you will learn about :...
How to Install Kali without any Problem

Complete Guidance to Install Kali linux in Dual Boot Mode without any Problem

2
Before start Complete Guidance to Install Kali linux in Dual Boot Mode without any Problem remember it's slogan:- The Quiter you become ,the more you are able to hear Do you...

Facebook’s New Notification Feature: Facebook will now Notify you if Government is Spying on...

0
Yet another feature by Facebook to make the world’s largest social network more secure. Facebook has just launched a new Notification feature that will alert you if it believes...
dsploit top penetration testing application for android mobiles

Top Penetration Testing Application for Android Mobiles

0
Android is a Linux based small operating which  runs on mobile. Most of the user in the world are using Android because of its large application in  play or...
Malware analysis sandboxing

What is Sandboxing and How it works?

0
In this article, we will discuss sandboxing, how it works and list of free sandboxing environments, etc. Hybrid analysis, Malware analysis, and Threat analysis, they all use the same technology...