Silence Hacker Group Attack on Banks Around the World

The silence hacker group is one of the most active threat actors group that targets financial sectors. The group initially attacks banks in Russia and now the group expanded its...

Make Tor Default Gateway For Network

Nipe is a Perl script to make Tor default gateway for network, this script enables you to directly route all your traffic from your computer to the Tor network through...

Mobile Hacking Firm Cellebrite’s UFED Tool can Hack any iOS & Android

Israeli forensics firm and well-known Law enforcement contractor Cellebrite released a public statement that they can hack any iOS and High-end Android devices for law enforcement agencies. Cellebrite Mobile Synchronization is...

Disgruntled bug-hunter drops Steam zero-day to get back at Valve for refusing him a...

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: The Register A security bod angry at Valve’s handling of bug reports has released a zero-day...

Silence Hacker Group Attack on Banks Around the World

The silence hacker group is one of the most active threat actors group that targets financial sectors. The group initially attacks banks in Russia and now the group expanded its...

First‑of‑its‑kind spyware sneaks into Google Play

ESET analysis breaks down the first known spyware that is built on the AhMyth open-source espionage tool and has appeared on Google Play – twice ESET researchers have discovered the first...

Bugs in Canon DSLR Camera Let Hackers Infected with Ransomware

Researchers discovered multiple critical vulnerabilities in Picture Transfer Protocol (PTP) that allows attackers to infect the Canon DSLR camera with ransomware to encrypt the pictures and demand the ransom. An attacker...

Mobile Hacking Firm Cellebrite’s UFED Tool can Hack any iOS & Android

Israeli forensics firm and well-known Law enforcement contractor Cellebrite released a public statement that they can hack any iOS and High-end Android devices for law enforcement agencies. Cellebrite Mobile Synchronization is...

Blockchain Partners with Polkadot Network

Today, we’re partnering with the Polkadot Network to accelerate the adoption and decentralization of Polkadot tokens (“DOTs”) as it aims to solve the challenges of cross-blockchain interoperability and create a...

FBI warns of romance scams using online daters as money mules

Up to 30 percent of romance fraud victims in 2018 are estimated to have been used as money mules Scammers are using dating sites and apps not only to scout for...

APLICATIONS

Hacking – Basics for a Newbie

Let’s start with the main question, What Is Hacking? Hacking is basically doing something which you are not supposed to do. Sounds easy?...

HOT NEWS