Home Technology - Hacking

Technology - Hacking

Technology news and blogs

Hacking WhatsApp with GIF Image

A vulnerability in WhatsApp has been discovered that can be used to compromise user chat sessions, files, and messages in other words WhatsApp can be hacked by just sending a...

SIM Card Browser Vulnerability let Hackers Control Mobile

The WIBattack vulnerability impacts hundreds of millions of telecom subscribers worldwide. The vulnerability comes from the sim card and it doesn’t depend on the mobile phone or the operating system. The...

What is Wireless Security? How To Secure Wi-Fi Networks (Guide)

Wireless security is specifically created to keep unauthorized users from accessing your Wireless Network and stealing sensitive information. The type of Wireless security that an individual uses is identified by...

SIM Card Browser Vulnerability let Hackers Control Mobile

The WIBattack vulnerability impacts hundreds of millions of telecom subscribers worldwide. The vulnerability comes from the sim card and it doesn’t depend on the mobile phone or the operating system. The...

Hacker Published Jailbreaking Exploit for iOS Devices

An iOS security researcher with twitter handle Axi0mX released an Epic Jailbreaking tool dubbed Checkm8, exploit iOS device form iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11...

What is Wireless Security? How To Secure Wi-Fi Networks (Guide)

Wireless security is specifically created to keep unauthorized users from accessing your Wireless Network and stealing sensitive information. The type of Wireless security that an individual uses is identified by...

How Virtual Reality Can be the Future of Education

One of the major problems that students battle with is understanding very abstract parts of...

SIM Card Browser Vulnerability let Hackers Control Mobile

The WIBattack vulnerability impacts hundreds of millions of telecom subscribers worldwide. The vulnerability comes from the sim card and it doesn’t depend on the mobile phone or the operating system. The...

What is Wireless Security? How To Secure Wi-Fi Networks (Guide)

Wireless security is specifically created to keep unauthorized users from accessing your Wireless Network and stealing sensitive information. The type of Wireless security that an individual uses is identified by...

APLICATIONS

Amazon Echo and the Alexa dollhouses: Security tips and takeaways

Tips on securing the Alexa service on Amazon Echo devices, notably voice purchasing, a topic brought into focus by the recent “San Diego...

HOT NEWS