Attackers are using facebook messenger to spread Locky Ransomware

Attackers are using facebook messenger to spread Locky Ransomware

0
Any Facebook message with an image file (.svg format) send by your friend can be a Locky Ransomware file, so just avoid clicking it. What is Locky Ransomware? Locky is ransomware released...
encryption and decryption

How to use backtrack

17
Note: Instead of using backtrack use Kali Linux | Rebirth of BackTrack, the Penetration Testing Before you start Before we start playing with safty tools follow the following steps :- Download btr5...
Whatsapp data in cloud

Now BackUp Your WhatsApp Data to Google Drive

0
BackUp Your WhatsApp Data   The first thing comes to my mind when I think about losing my phone is “Oh! No I will lose all my data all the conversation”...
crack web form

How To Crack Password Using Hydra In Kali Linux

0
Weak password is still a big problem in the world of security. User need to set a strong password to restrict the access of data from anonymous user. Even a...

Apple refused to unlock the iPhone on the enforcement of U.S Federal Judge

0
Once again the tech giant Apple has proved that how much they are concerned about the privacy of its users, and they will never break the users’ security for...
Anonymity buffercode

How to surf internet Anonymously

1
Hello friends this  post is about how to hide your machine IP for surfing internet Anonymously. To read this may bore you but keep patience because it is important....
Mozilla Placing High Bandwidth Tor Middle Relays

Mozilla Placing High Bandwidth Tor Middle Relays

0
 Mozilla Placing High Bandwidth Tor Middle Relays  Mozilla Placing High Bandwidth Tor Middle Relays to add more secure anonymity in Firefox. Tor and Mozilla working together to provide a more...
Vulnerability in PayPal user authentication system

Vulnerability in PayPal user authentication system

0
It's always a matter of attraction when money is in the frame of attack. So It's time to get into the users PayPal account.. Paypal provides online / ebay...
DemonBot, Botnet

Demonbot is on rising | A New Botnet

0
As security is getting stronger so hackers are getting more stronger. Once a loophole is closed by Operating systems or any vendors then hackers find out another way to breach...
Shocking secrets about Ashley Madison

Shocking secrets about Ashley Madison: Women were actually not using the website

0
The hacked data of Ashley Madison website is been a reason for many criminal activities since it’s data is dumped on to the dark web (also known as deep...
log management

EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK

0
EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK What’s in the LOG? The information you need to answer Who’s attacking us today? and How did...
Three Vulnerabilities Of Starbucks Website: Credit Card details in Risk

Three Vulnerabilities Of Starbucks Website: Credit Card details in Risk

0
The famous coffeehouse Starbucks is undoubtedly the best in its class and taste but registering yourself on the website of Starbucks could be dangerous. The registered accounts and credit...
Kill Switch Software

Smartphones with a ‘kill switch’ to prevent from thefts

0
New software 'kill switch' to thwart thefts: Microsoft & Google Follows Apple Security Software Which Render handset Unusable after Reported Stolen Microsoft and google said that phones using their operating systems...

Finally Hackers Dumped Stolen Ashley Madison Data Onto Dark Web

0
Ashley Madison, the largest cheating website with the tag line " Life is short. Have an affair " was hacked by the group of hackers called itself The Impact Team . And...