Our Services

Don`t Believe us ? Ask them | Reported critical vulnerabilities

Cyber Security Research Articles

System Management Mode

System Management Mode Speculative Execution Attacks

System Management Mode Speculative Execution Attacks System Management Mode (SMM, sometimes called ring -2) is an operating mode of x86 central processor units (CPUs) in which all normal execution, including the operating system, is suspended. An alternate software system which usually resides in the computer’s firmware, or a hardware-assisted debugger, is then executed with high

Read More

How To Become White Hat Hacker

White Hat Hacker – Learn How to Become White hat hacker, or ethical hacker, uses penetration testing techniques to test an organization’s IT security and to identify vulnerabilities. IT security staff then uses the results of such penetration tests to remediate vulnerabilities, strengthen security and lower an organization’s risk factors. Nowadays, the world has experienced

Read More
Wireless Network

WiFi (Wireless) Network

Wireless Network –  How to Hack Wireless network is a network that uses radio waves to link computers and other devices together. The implementation is done at the Layer 1 (physical layer) of the OSI model. Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are

Read More
GhostInTheNet

GhostInTheNet: protects Linux from MITM/DOS/scan

GhostInTheNet GhostInTheNet is a Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan. Properties: Network Invisibility Network Anonymity Protects from MITM/DOS Transparent Cross-platform Minimalistic Dependencies: Linux 2.4.26+ – will work on any Linux-based OS, including Whonix and RaspberryPI BASH – the whole script root privileges – for kernel controlling

Read More
Vulnerability

Vulnerability: New Intel CPU Vulnerabilities Found

Vulnerability Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack. It is may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat. Computer users and

Read More
DRAKVUF

DRAKVUF: Black-box Binary Analysis

DRAKVUF DRAKVUF consists of several plugins, each collecting different aspects of the guests’ execution, like logging system calls or tracking kernel heap allocations. It is a virtualization based agentless black-box binary analysis system. DRAKVUF allows for in-depth execution tracing of arbitrary binaries (including operating systems), all without having to install any special software within the

Read More
Wireless Penetration testing tool

Wireless Penetration Testing Tool

Wireless Penetration Testing Tool Wireless penetration testing tool is an important aspect of any security audit project, organizations are facing serious threats from their insecure WiFi network. A compromised wifi puts the entire network at risks. Consider the recent darkhotel attack, where the top business executives were the target. Penetration testing tool are used as

Read More
DAMP

DAMP: Persistence Through Host-based Security Descriptor Modification

Security Descriptor Modification | Host Based | DAMP Security Descriptor Modification, host based persistence into DAMP. This project contains several files that implement host-based security descriptor “backdoors” that facilitate the abuse of various remotely accessible services for arbitrary trustees/security principals. tl;dr – this grants users/groups (local, domain, or ‘well-known’ like ‘Everyone’) of an attacker’s choosing

Read More

Top 6 best Linux Distribution for new Linux users

Linux Distribution Linux distributions are “easy to use”. Some users may refute this view, but in fact, when it comes to Linux, most people who are not engaged in IT or software development work will be attracted by the easiest user experience.     Ubuntu Ubuntu is an open source operating system first released on

Read More
Geoip attack

Geoip attack map: Cyber security geoip attack map

Geoip attack map Visualization Geoip attack   map visualizer was developed to display network attacks on your organization in real time. The data server follows a syslog file, and parses out source IP, destination IP, source port, and destination port. Protocols are determined via common ports, and the visualizations vary in color based on protocol type. This

Read More

VMware Escapes: A bunch of Red Pills

VMware VMware is one of the leaders in virtualization nowadays. They offer VMware ESXi for cloud, and VMware Workstation and Fusion for Desktops (Windows, Linux, macOS). The technology is very well known to the public: it allows users to run unmodified guest “virtual machines”. Often those virtual machines are not trusted, and they must be

Read More
Jackhammer

Jackhammer: Security vulnerability assessment/management tool

Jackhammer Jackhammer  is a collaboration tool built with an aim of bridging the gap between Security team vs dev team, QA team and being a facilitator for TPM to understand and track the quality of the code going into production. It could do static code analysis and dynamic analysis with inbuilt vulnerability management capability. It

Read More
Pybelt

Pybelt: The hackers tool belt

Pybelt Pybelt   is a Python-based hackers tool belt capable of cracking hashes without prior knowledge of the algorithm, scanning ports on a given host, searching for SQLi vulnerabilities in a given URL, verifying that your Google dorks work like they should, verifying the algorithm of a given hash, scanning a URL for XSS vulnerability, and

Read More

Noriben: Portable, Simple, Malware Analysis Sandbox

Noriben Noriben   is a Python-based script that works in conjunction with Sysinternals Procmon to automatically collect, analyze, and report on runtime indicators of malware. In a nutshell, it allows you to run your malware, hit a keypress, and get a simple text report of the sample’s activities. Noriben allows you to not only run malware

Read More
Pharos

Pharos – Automated static analysis tools for binary programs

Pharos Pharos is a open source, static binary analysis framework that uses the ROSE compiler, developed by Lawrence Livermore National Laboratory for disassembly, control flow analysis, instruction semantics. These features help you automate common reverse engineering tasks with a focus on malicious code analysis. The Pharos framework is made up of the following static binary

Read More
Risks of Using Public Wi-Fi

Danger of Using Public WiFi | What You Need to Know – ICSS

Danger of Using Public WiFi WiFi users are at risk from hackers, but fortunately there are safeguards against them. The recent explosion of free, public WiFi has been an enormous boon for working professionals. Since these free access points are available at restaurants, hotels, airports, bookstores, and even random retail outlets, you are rarely more

Read More

Deep-pwning | Metasploit for machine learning

Deep-pwning Deep-pwning is a lightweight framework for experimenting with machine learning models with the goal of evaluating their robustness against a motivated adversary. Note that deep-pwning in its current state is nowhere close to maturity or completion. It is meant to be experimented with, expanded upon, and extended by you. Only then can we help

Read More
Malware

Malware | Trojans & Keyloggers | ICSS Student |Gopal Roy

Malware Malware means malicious software.in fact, it has been a problem for ages.it is basically a program designed to infect a computer without the owner’s knowledge. Type of Malware Malware exists in Manu forms. Some common types of malware that one needs to keep track of are: Trojan Horse-Trojan virus or Trojan horse is a

Read More
Pentmenu

Pentmenu: a bash script for recon and DOS attacks

Pentmenu Pentmenu is a bash script inspired by pentbox. It is designed to be a simple way to implement various network pentesting functions, including network attacks, using wherever possible readily available software commonly installed on most Linux distributions without having to resort to multiple specialist tools.   Requirements for Pentmenu: bash sudo curl netcat (must

Read More
AWS

AWS S3 Security Scanning Tool | AWSBucketDump

AWS AWS launched in 2006 from the internal infrastructure that Amazon.com built to handle its online retail operations. AWS was one of the first companies to introduce a pay-as-you-go cloud computing model that scales to provide users with compute, storage or throughput as needed. Amazon Web Services provides services from dozens of data centers spread

Read More
SandiFlux

Sandiflux: Another botnet using Fast Flux technology has emerged

SandiFlux SandiFlux is a new Fast flux infrastructure has been identified. Hackers started using Fast Flux infrastructure in wild to hide the malicious activities such as malware and phishing campaigns. Fast Flux is a technique to have multiple IP addresses assigned to the same domain and they change consistently in quick sessions through DNS records.

Read More
StreamAlert

Streamalert: Serverless, Realtime Data Analysis Framework

Streamalert StreamAlert is a serverless, real-time data analysis framework which empowers you to ingest, analyze, and alert on data from any environment, using datasources and alerting logic you define. A serverless framework for real-time data analysis and alerting. Airbnb needed a product that empowered both engineers and administrators to ingest, analyze, and alert on data

Read More

GScript: Scriptable dynamic runtime execution of malware

GScript (Genesis Scripting Engine) Genesis Scripting (gscript for short) is a technology I’ve developed to enable more intelligent malware stagers. Typically, stagers are pretty dumb. Most stagers are unique to the malware they deploy and do not allow for “bundling” of multiple payloads. Sophisticated attackers do in fact bundle their payloads, which makes runtime uncertainty

Read More
pagodo

Pagodo: Automate Google Hacking Database scraping

Pagodo (Passive Google Dork) The goal of this project was to develop a passive Google dork script to collect potentially vulnerable web pages and applications on the Internet. There are 2 parts. The first is ghdb_scraper.py that retrieves Google Dorks and the second portion is pagodo.py that leverages the information gathered by ghdb_scraper.py.    

Read More
WifiGod

WifiGod: Python script to test network security

WifiGod WifiGod is a tool coded and developing by Blackhole, it is written in the Python programming lanuage and is used to test network security. Coded and Developed by Blackhole.   Need to know about WifiGod: Monitor Interface is created for you:When you enter your network interface in the options, always use one that is

Read More

GyoiThon: growing penetration test tool using Machine Learning

GyoiThon GyoiThon is a growing penetration test tool using Deep Learning. Deep Learning improves classification accuracy in proportion to the amount of learning data. Therefore, GyoiThon will be taking in new learning data during every scan. Since GyoiThon uses various features of software included in HTTP response as learning data, the more you scan, the

Read More

FakeDns: Python MITM DNS server with support for DNS Rebinding attacks

FakeDns FakeDns is A regular-expression based python MITM DNS server with correct DNS request passthrough and “Not Found” responses. Now with round-robin & improved options. A python regular-expression based DNS server.     How to use the hosts file to fake DNS: The hosts file is stored on a computer or device to provide local

Read More
NetRipper

NetRipper: Smart traffic sniffing for penetration testers

NetRipper NetRipper is a fairly recent tool that is positioned for the post-operating system based on Windowsand uses a number of non-standard approaches to extract sensitive data. It uses API hooking in order to intercept network traffic and encryption related functions from a low privileged user, being able to capture both plain-text traffic and encrypted traffic

Read More
TrickBot

TrickBot (WebRoot) ship a new module, “screenlocker”

TrickBot TrickBot the recent version of banking trojan now includes a screenlocker component, suggesting the malware’s operators might soon start holding victims for ransom if infected targets don’t appear to be e-banking users. The good news is that the screenlocker mechanism is not fully functional just yet, and appears to still be under development. Nonetheless,

Read More
SafeSQL

Safesql: Tatic analysis tool for Go that protects against SQL injections

SafeSQL SafeSQL is a static analysis tool for Go that protects against SQL injections. SQL Injection is one of the vulnerabilities in OWASP’s Top Ten List for Web Based Application Exploitation. These types of attacks takes place on Dynamic Web applications as they interact with the databases for the various operations.     How does

Read More

Trape: People tracker on the Internet

Trape Trape is a recognition tool that allows you to track people, the information you can get is very detailed. We want to teach the world through this, as large Internet companies could monitor you, obtaining information beyond your IP. This tool has been published educational purposes in order to teach people how bad guys could

Read More
Chrome Zero

Chrome Zero: Chrome extension

Chrome Zero Chrome Zero is a Google Chrome extension to protect users from microarchitectural and side-channel attacks. Chrome Zero implements JavaScript Zero, a fine-grained policy-based system which allows changing the behavior of standard JavaScript interfaces and functions. Using so-called policies, Chrome Zero enforces certain restrictions to a website to protect users from malicious JavaScript. The

Read More
Attacks

List of 29 Different Types of USB Attacks

 Attacks of USB Attacks of USB is the driver-related attacks family in which an attacker plugs in a compromised malicious USB device that causes the host to download a specific malicious driver crafted in such a way as to execute malicious code on the host. Researchers from the Ben-Gurion University of the Negev in Israel have identified 29 ways in

Read More
VPN

Algo VPN: Set up a personal IPSEC VPN in the cloud

Algo VPN Algo VPN is a set of Ansible scripts that simplify the setup of a personal IPSEC VPN. It uses the most secure defaults available, works with common cloud providers, and does not require client software on most devices. The ‘VP of all Networks’ is strong, secure and tidy. It uses the least amount

Read More
Blind Cross Site Scripting

ezXSS: Test Blind Cross Site Scripting

Blind Cross Site Scripting Blind cross site scripting (BXSS) is a variation of stored XSS, where the injection point and the execution point are different. It’s harder to find and certainly requires a different methodology than testing for stored (non-blind), reflected, or even DOM-based XSS. Typically, with stored Blind cross site scripting, the payload is

Read More
CredSSP

Critical bugs in CredSSP allow remote code execution on Servers

CredSSP allow remote code The newly discovered Credential Security Support Provider protocol (CredSSP) vulnerability on the Windows platform allows hackers to use Remote Desktop Protocol (RDP) and Windows Remote Manager (WinRM) to remotely steal data or run malicious code. The CredSSP protocol was originally designed to provide cryptographic authentication when Windows hosts use RDP or

Read More
Agrigento

Agrigento: Identify privacy leaks in Android apps

Agrigento Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic. It performs root cause analysis of non-determinism in the network behavior of Android apps. Agrigento works in two steps: first, Agrigento establishes a baseline of the network behavior of an app; then, modifies sources

Read More
Dorothy

Dorothy 2: A malware/botnet analysis framework

Dorothy 2 Dorothy 2 is a malware/botnet analysis framework written in Ruby. Dorothy 2 is a framework created for suspicious binary analysis. Main strengths of Dorothy are a very flexible modular environment and an interactive investigation framework with a particular care of the network analysis. Additionally, it is able to recognize newly spawned processes by

Read More
Trinity

Trinity – Fuzz tester

Trinity – A Linux System call fuzz tester Trinity is a Fuzz testing engine. One that has been done many times before on Linux, and on other operating systems, where Trinity differs is that the arguments it passes are not purely random. Trinity is slightly different from traditional fuzzing. Trinity Fuzzer knows how to do “really

Read More
Malheur

MALHEUR – Automatic Analysis of Malware Behavior

Malheur: Automatic Analysis of Malware Behavior Malheur is a tool of automatic analysis malware behavior. Malheur has been designed to support the regular analysis of malicious software and the development of detection and defense measures. Malheur allows for identifying novel classes of malware with similar behavior and assigning unknown malware to discovered classes. MALHEUR supports four

Read More

Limon: Sandbox for Analyzing Linux Malwares

Limon: Sandbox for Analyzing Linux Malwares Limon is a sandbox for automating Linux malware analysis. It was developed as a research project for learning Linux malware analysis. It is written in python and uses custom python scripts and various open source tools to perform static, dynamic/behavioural and memory analysis. Limon analyzes the malware in a controlled

Read More
Droid

DAFF – Droid Application Fuzz Framework

Droid Application Fuzz Framework Droid Application Fuzz Framework (DAFF) helps to fuzz Android Browsers and PDF Readers for memory corruption bugs in real android devices. Everyone can use the inbuilt fuzzers or import fuzz files from one’s own custom fuzzers. DAFF consist of inbuilt fuzzers and crash monitor.  Droid-FF is the very first Android fuzzing framework

Read More

Mara Framework: Mobile Application Reverse engineering and Analysis Framework

Mara Framework MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering and analysis tools, to assist in testing mobile applications against the OWASP mobile security threats. Its objective is to make this task easier and friendlier to mobile application developers and security professionals. How it all

Read More
Hash

Hash Buster – scraps online hash crackers to find cleartext of a hash

Hash Buster A hash buster is a program that generates a string of text for insertion in a spam message so that, to a spam filter, the e-mail appears to be a different message each time it is sent. The text might appear in the Subject line, its From line, or after the message body,

Read More
Network Sniffing Tools

Top 20 Network Sniffing Tools

Network Sniffing Tools Network Sniffing Tools were listed since 2014 from the web’s favorite hacking/ pentesting software hacker tools as used by hackers, geeks, ethical hackers and security engineers (as well as black hat hackers). This list and resource sprung to life when we organized an online poll way back in 2013 that was very

Read More
Cybersecurity Threats

Cybersecurity Threats not to be ignored by SMB Etailers

Cybersecurity Threats not to be ignored by SMB Etailers. Some small e-commerce website operators may think their relative obscurity offers protection, but the fact is that SMBs are especially vulnerable to cyberattacks and malware. “Very often small businesses don’t feel vulnerable to cybersecurity threats because they assume cybercriminals prefer to launch attacks on large companies,”

Read More
Cyber Security

Cyber Security in the digital dark age

Cyber Security in the digital dark age Cyber Security in the digital dark age. Business leaders who recently convened in Davos for the annual World Economic Forum fretted over the various catastrophes that could hit the globe hard and – given the recent spate of cyber attacks – cyber security was high up on the

Read More
Cyber Attacks

Cyber Attacks and Asia’s geopolitical events could have a link?

Cyber Attacks and geopolitical events in Asia may go hand in hand, according to Comodo’s first annual Global Malware Report for 2017, particularly when it comes to North Korea and China. Cyberespionage and cyber war preparation in Asia is nothing new, so it is no surprise that the region experiences significant Cyber Attacks spikes when

Read More
Hacking Websites

Hacking websites? Here are the six most popular ways.

Hacking websites? Here are the six most popular ways. Hackers can hack a website or system or network, which would ultimately lead to the data theft, shutting down of the website, businesses experiencing big losses and so many other serious issues arising due to Hacking websites. Hackers can carry out their attacks in numerous ways to

Read More
Zero Net

What is Zero Net and why one should use it?

What is Zero Net? Zero Net is a network of peer-to-peer users. It is based on the idea of Decentralized Computing. In the modern times, our desktop PCs and other computers have become so advanced that their full potential far exceeds than what is needed. As a matter of case, it remains ‘idle’ most of

Read More
Cybersecurity Audits

Cybersecurity Audits of companies? Here is what you need to know

Cybersecurity Audits? Well! unfortunately, most companies believe that their computer systems are secure. But one of the only ways to determine whether this is actually true is by performing a thorough audit of computer systems. Here is why your company should make a point of auditing its security on a regular basis, not only this

Read More
Identity data

Identity data turning toxic for big companies. Wait but how?

Identity data turning toxic for big companies. Wait but how? Google might be in trouble for collecting the personal data of its users, but many companies have a growing incentive to rid their hands of the data that users entrust them with. This is because of growing costs of holding onto it. A major cause

Read More
Communication is key

Communication is key when responding to a cyber security incident

Communication is key when responding to a cybersecurity incident. There’s an old joke that goes something like this: “To err is human, but to really screw things up you’ll need a computer.” Of course, it’s funny, but as we all know computers just do what they’re told (or programmed) to do.  They’ll do it to

Read More
Healthcare Industry

Healthcare industry getting affected by cyber

Healthcare industry getting affected by cyber. The Healthcare industry has featured in the top 5 industries attacked by cyber criminals for a number of years now. The WannaCry ransomware attack earlier this year that affected many health trusts across England and Scotland brought the health impact of the cyber threat to the forefront of media

Read More
Skygofree

Skygofree android spyware discovered

Skygofree (one of the most powerful strains of Android spyware) has been discovered. Security researchers from Kaspersky have found one of the most powerful strains of Android spyware that enable attackers to take full control over the infected devices remotely. The new spyware has been called Skygofree, it has been created for targeted surveillance. The researchers traced

Read More
Blackberry hacked

Blackberry hacked to mine cryptocurrency

Blackberry hacked to mine cryptocurrency. As cryptocurrency spread its roots globally, the ways of illegally earning or ‘mining’ it is also becoming advanced and much more sophisticated. Blackberry mobile’s website recently became a victim when hackers used it to illegally mine cryptocurrency. With Bitcoin and other cryptocurrencies gaining popularity, hackers are finding newer ways to mine.

Read More
DuckDuckGo, Brave

DuckDuckGo, Brave Improving online privacy

DuckDuckGo Brave Improving online privacy. The feature is accessible today via the new Brave browser desktop release 0.19.116 and will be combined in Brave Android and iOS apps in the first quarter of 2018. Here’s how DuckDuckGo Brave are increasing online privacy together. Users that open a new private tab in Brave will be offered with

Read More
Wi-Fi Alliance WPA3

Wi-Fi Alliance WPA3 with new security features

Wi-Fi Alliance WPA3 with new security features. The Wi-Fi Alliance has finally announced the long-awaited next generation of the wireless security protocol—Wi-Fi Protected Access (WPA3). Wi-Fi Alliance WPA3 will replace the existing WPA2—the network security protocol that has been around for at least 15 years and widely used by billions of wireless devices every day,

Read More
Apple update

Apple update Meltdown and Specter flaws resolved

Apple update Meltdown and Spectre flaws resolved. 2018 kicked off with a bang security-wise due to the announcement of the serious Meltdown and Spectre flaws found in processors widely used by a wide range of computing devices and smartphones. 2018 kicked off with a bang security-wise due to the announcement of the serious Meltdown and

Read More
Location tracking services vulnerabilities

Location tracking services vulnerabilities allow to access unauthorized GPS location data

Location tracking services vulnerabilities allow accessing unauthorized GPS location data. Security scholars have published a testimony on a series of errors that they termed “Trackmageddon” that distress many GPS and location tracking services. These security defects could permit cybercriminals to divulge delicate information on millions of online location tracking devices controlled by vulnerable GPS services.

Read More
Opera browser update

Opera browser update to combat cryptocurrency mining

Opera browser update to combat cryptocurrency mining. The last year has seen a rise in the number of websites hogging visitor’s CPU and browser resources by surreptitiously mining for cryptocurrencies while you surf. Due to Opera browser update, Sites like Pirate Bay have found themselves in hot water after visitors discovered it had added CoinHive’s

Read More
Automatic autofill of credentials

Automatic autofill of credentials, is it really safe?

Automatic autofill of credentials, is it really safe? Nowadays, Trackers found silently grabbing your information as you surf the web. Is your browser’s built-in login manager leaking your username (and possibly your password too)? Researchers at Princeton’s Centre for Information Technology Policy have uncovered two third-party tracking scripts that can scoop up information provided by your

Read More
phpmyadmin-hacking

phpMyAdmin – A critical security vulnerability has been reported

phpMyAdmin – A critical security vulnerability has been reported. One of the most popular applications for managing the MySQL database—which could allow remote attackers to perform dangerous database operations just by tricking administrators into clicking a link. Discovered by an Indian security researcher, Ashutosh Barot, the vulnerability is a cross-site request forgery (CSRF) attack and

Read More
Forever 21

Forever 21 payment card breached

Forever 21 payment card breached. First notified in November of a data breach incident, popular clothing retailer Forever 21 has now confirmed that hackers stole credit card information from its stores throughout the country for several months during 2017. Although the company did not yet specify the total number of its customers affected by the

Read More
Password Managers exploited

Password Managers can be exploited using Web Trackers

Password Managers exploited using web trackers. This type of abusive conduct is possible because of a configuration flaw in the login handlers included with all browsers, login managers that allow browsers to memorize a user’s username and password for particular sites and auto-insert it in login fields when the user revisits that site again. Experts

Read More
Smartphones are hackable

Smartphones are hackable using sensors via guessing 4 digit smartphone PIN

Smartphones are hackable using sensors via guessing 4 digit smartphone PIN. NTU researchers have revealed that smartphones can now be hacked using the data accumulated from sensors. Dr. Shivam, a scientist at NTU, who recently developed an app that can hack data from smartphones using sensors, found this recently and the news has sent shockwaves

Read More
FBI’s biometric hacked?

FBI’s biometric hacked?

FBIs biometric hacked. The allegations that Russia hacked the 2016 elections in the United States are known to many but now biometric data of millions of American citizens may or may not be at risk of being compromised as software used by the Federal Bureau of Investigation (FBI), the Transportation Security Administration (TSA) and 18,000

Read More
Security vulnerability found

Security vulnerability found in ATM machines running on Windows XP in Russia

Security vulnerability found in ATM machines running on Windows XP in Russia. All ATMs that are still running on Microsoft’s 16-year-old Windows XP operating system are at the risk of getting hacked easily, as the OS is no longer supported by the Redmond giant except for emergency security patches (for instance, patch blocking the WannaCry ransomware

Read More
Satori IOT Botnet

Satori IoT Botnet Exploits Zero-Day to Zombify Huawei Routers

Satori IoT Botnet Exploits Zero-Day to Zombify Huawei Routers identified by researchers. The flaw is in Huawei’s router model HG532. It said it is tracking hundreds of thousands of attempts to exploit the vulnerability in the wild. The Mirai botnet made headlines in October 2016, targeting DNS provider Dyn and the Krebs on Security website with massive DDoS attacks.

Read More
Cryptocurrency Mining Virus

Cryptocurrency Mining Virus spreading through Facebook Messenger

Cryptocurrency Mining Virus spreading through Facebook Messenger. These hackers send a video file (packed in zip archive) from anybody’s profile (or your friends) – Do not click on it. Researchers from security firm Trend Micro are warning users of a new cryptocurrency mining bot which is spreading through Facebook Messenger and targeting Google Chrome desktop

Read More
Wordpress Captcha plugin

WordPress captcha plugin having a hidden backdoor affects over 300,000 websites

WordPress captcha plugin having a hidden backdoor affects over 300,000 websites. Obtaining prevalent plugins with an enormous user-base and using it for effortless malicious campaigns have become a new trend for bad players. Recently a renowned developer BestWebSoft sold a popular WordPress Captcha plugin to an anonymous buyer, who then amended the plugin to download and

Read More
ProtonVPN Android App

ProtonVPN has launched its app!

ProtonVPN has announced the public release of the ProtonVPN Android app! The app is available as of now in the Play Store. To download it, simply follow this link: https://play.google.com/store/apps/details?id=com.protonvpn.android They first launched ProtonVPN in June of this year, and have seen an overwhelming response from the community. They are continuously working towards their mission

Read More
A new android malware

A new android malware can be a possible threat to your phone.

A new Android malware has been discovered by a group of researchers, which can possibly physically damage your phone. Your phone is physically under threat due to this new Android Malware. Hackers, as well as legitimate website administrators, are progressively using Javascript based cryptocurrency miners to monetize by levying the CPU power of your PC

Read More
SSL Certificate

SSL Certificate

SSL Certificate SSL Certificate authenticity is being doubted because of the increase in the online hacking of your personal data even from the websites having SSL certificate. Wondering how it’s done? Here we have explained it in a very simplified manner. Did you know how the online passwords are hacked? Well, read on to learn.

Read More
Security flaw in WPA2

Security Flaw in WPA2

  Security Flaw in WPA2 Security flaw in WPA2, the security protocol for most modern WiFi systems could make it easily possible for the attackers to steal all sorts of sensitive data such as credit card numbers, passwords, emails etc – said by Researchers at Belgian university KU Leuven. Wifi systems could be vastly affected

Read More
Breach of personal data

Breach of personal data

Breach of personal data Breach of personal data by online hackers has jeopardized the online user’s life in a great way. It’s usually the weakest link that hackers go for at first to gain access to your online accounts. Over 1.4 Billion plain texts leaked passwords dispersed online Reusing the same password across multiple channels

Read More
UBER Authentication Vulnerability found

UBER Authentication Vulnerability found

UBER Authentication Vulnerability found that allows anyone to change anyone’s Uber account password without any authentication. Vincenzo C., an Italian security expert who is popular on Twitter as @Procode701, has discovered a critical Authentication Vulnerability in UBER  by which anyone can reset the password for any account. The company held the Bug Bounty program which

Read More
Hackers Attacked 100 countries using NSA Spying tool

Hackers Attacked 100 countries using NSA Spying tool

Hackers Attacked 100 countries using NSA Spying tool A group called the Shadow Brokers using hacking tools leaked a global cyber-attack online believed to have been developed by the US National Security Agency (NSA). This attack is believed to be the biggest cybersecurity attacks in recent history. Hackers Attacked 100 countries using NSA Spying tool. The malicious

Read More
Urgent Malware Warning Issued by known Mac App developers

Mac App developers Issued Urgent Malware Warning

Mac App developers Issued Urgent Malware Warning Mac App developers Issued Urgent Malware Warning. Mac security has been going through some difficult times after the warning from Checkpoint to users regarding a first of a kind Trojan spreading in Europe. The latest malicious problem has been found in one of the most important video transcoding

Read More

Employee paid $300,000 for hacking employer

Employee paid $300,000 for hacking employer Employee paid $300,000 for hacking employer. Security Specialists, a former private security officer has been told to pay nearly $319,000 in damages for hacking his employer’s payroll records, so that he can fill the number of hours he had worked hard. The main culprit , Yovan Garcia later hacked

Read More
Retailer Debenhams's Flowers website hacked

Retailer Debenhams’s Flowers website hacked

Retailer Debenhams’s Flowers website hacked Retailer Debenhams’s Flowers website hacked. The news came that Retailer Debenhams’s Flowers website was hacked and up to 26,000 customers, personal data has been compromised. Department store chain Debenhams has issued a statement on the data breach, revealing payment details, names and addresses were potentially taken , which targeted Ecomnova, a

Read More
Intel fixed nine year’s old flaw

Intel fixed nine year’s old flaw

Intel fixed nine years old flaw Intel fixed nine years old flaw. Yes, after nine years a flaw was detected and patched by Intel. Intel, one of the world’s largest semiconductor chip makers, has come under fire it’s emerged that the company had sold workstation and server chips with a vulnerability that could give a remote

Read More
UIDAI rejects data leak claim

UIDAI rejects data leak claim

UIDAI rejects data leak claim On Tuesday (May 02),UIDAI rejected a report about an online leak of Aadhaar numbers and bank accounts linked to them. UIDAI rejects data leak claim which was claimed by a research report. A research report by a Bangalore-based organization, claimed that almost 13 crore Aadhar numbers have been leaked along with

Read More
App Flaw Reportedly Creates Backdoor Hacking Millions Android Phones

App Flaw Reportedly Creates Backdoor Hacking Millions Android Phones

App Flaw Reportedly Creates Backdoor Hacking Millions Android Phones It has been revealed through a recent study of an internet communication mechanism common in mobile devices that so-called ‘open ports’ are much more vulnerable to security breaches than expected. App Flaw Reportedly Creates Backdoor Hacking Millions Android Phones. Open ports are integral pieces of internet

Read More
Google Facebook $100 million email scam found

Google Facebook $100 million email scam found

Google Facebook $100 million email scam found The tech companies Google and Facebook have confirmed that they fell victim to a $100 million email scam. It was reported that a Lithuanian man had been charged over an email phishing attack against “two US-based internet companies.” Google Facebook $100 million email scam found Evaldas Rimasauskas, a

Read More
SNMP fault affects online devices

SNMP flaw affects online devices

SNMP flaw affects online devices A serious security flaw in the application of the SNMP (Simple Network Management Protocol) allows an attacker to gain control over at least 78 cable modem models. SNMP flaw affects online devices  which gives a green signal to the attackers. SNMP (Simple Network Management Protocol) is used for automated network device

Read More
Karmen low-cost ransomware found

Karmen low-cost ransomware found

Karmen low-cost ransomware found Karmen low-cost ransomware found. Yes, security experts have spotted a new “ransomware as a service” (RaaS) called Karmen from threat intelligence firm Recorded Future. This service permits anyone to set up an account and customize their own ransomware campaign. Ransomware is malware for data kidnapping, an exploit in which the attacker encrypts the victim’s data and demands

Read More
Suspected Russian hackers targeting French Presidential elections

Suspected Russian hackers targeting French Presidential elections

Suspected Russian hackers targeting French Presidential elections It was Suspected Russian hackers targeting French Presidential elections in France by launching a new cyber attack against the campaign offices of the front-runner candidate Emmanuel Macron, claimed by Trend Micro, A Tokyo-based cyber security firm. On Tuesday the report was released by the firm. The researchers doubted

Read More

1.4 Million citizens Aadhaar card leaked

1.4 Million citizens Aadhaar card leaked Though India goes ahead in its digital India, Security practices left behind a huge remark when coming to Indian Document Security. An incident in Jharkhand again seems to have raised some serious questions of Aadhaar’s data-breach vulnerabilities. 1.4 Million citizens Aadhaar card leaked which need to be secured in

Read More
Facebook Twitter Snapchat paying hackers to recover technical bugs

Facebook Twitter Snapchat paying hackers to recover technical bugs

Facebook Twitter Snapchat paying hackers to recover technical bugs In our day to day lives we socialize and interact with many different types of people, including family, friends, colleagues, or even complete “strangers”. Yes, most of the people we meet on social sites are strangers. Many have fake accounts, sending requests to people and people

Read More
Hackers collecting Pre-Hack data using Pixel tracking.

Hackers Collecting Pre-Hack data

Hackers Collecting Pre-Hack data Marketers and Advisers use a simple trick to track web users and email recipients. It is email marketing. This also been abused by cyber criminals and online spies to collect information on possible targets or to improve the efficiency of phishing attacks, both mass and targeted in scope. Hackers  collecting Pre-Hack

Read More
Protect Your Device From Hackers

Protect Your Device From Hackers

Protect Your Device From Hackers First thing to keep in mind that hacking a system for unauthorised access that does not belong to you is an illegal practice, whatever intention it may be. This is not the first time when any hacker has been watchful, we have seen many more cases in which hackers have

Read More
Phishing Attack Affects Browser

Phishing Attack Affects Browser

Phishing Attack Affects Browser A Chinese security researcher has revealed a scary phishing attack that is almost impossible to detect in web browsers like Chrome, Firefox, and Opera. The attack uses unicode characters in domains that look exactly like the common ASCII characters. For example, “xn--pple-43d.com” is equivalent to “аpple.com”. This Phishing Attack Affects Browser. Punycode is

Read More
Hackers announces NSA’s powerful Windows hacking tool

Hackers announces NSA’s powerful Windows hacking tool

Hackers announces NSA’s powerful Windows hacking tool Hackers announces NSA’s powerful Windows hacking tool .The Shadow Brokers, a hacking group, who previously stole and leaked a portion of the NSA hacking tools has just released a collection of spy tools that is allegedly used by the National Security Agency online. On Friday, the group published the

Read More
Five Prisoners hacked prison network

Five Prisoners hacked Prison Network

Five Prisoners hacked Prison Network Official Inspector General of the State of Ohio reported a 50-page investigative report of the incident which now came in public domain, that took place back in 2015. It came to know that Five Prisoners hacked Prison Network. According to the reports, five prisoners from the Marion Correctional Institution (MCI)

Read More
Indian Election Commission throws open challenge

Indian Election Commission throws open challenge

The  Indian Election Commission throws open challenge to hack its electronic voting machines (EVMs). This step is being taken by different political parties due to some rise of allegation, which claimed that machines used in UP elections only voted for BJP. The opposition parties have also demanded that paper trail of voting should be re-introduced in the

Read More
Unique Ransomware Vulnerability Attack

Unique Ransomware Vulnerability Attack

Unique Ransomware Vulnerability Attack In the Past few days, you might have heard about various news of hackers using malicious ransomware forcing users to pay huge amounts of money but  today’s scenario is something different. Today, we bring you a unique kind of ransomware which forces its victims to make a high score of at

Read More
Smartphone Update Vulnerability Found

Smartphone Update Vulnerability Found

Smartphone Update Vulnerability Found A Google Project Zero researcher, Gal Beniamini has found some vulnerabilities including a remote code execution in Broadcom’s Wi-Fi system-on-chip (SoC) which if exploited can allow attackers to compromise Smartphone devices like iPhone, Samsung, and Google Nexus. Smartphone update vulnerability found. Broadcom’s Wi-Fi chips are used in a number of well-known devices and any

Read More
North Korean hackers breached overseas banks

North Korean hackers breached overseas banks

North Korean hackers breached overseas banks North Korean hackers breached overseas banks to create a network of accounts to move around embezzled funds. CNN reported on Tuesday that “Funds from the operation are most likely being used to finance Pyongyang’s nuclear weapons development”. According to Kaspersky, a Russian cybersecurity firm, North Korea is linked to cyberattacks on

Read More
Anonymous hacks ISIS website; infecting users with malware

Anonymous Hackers Hacked ISIS site

Amaq, the official news agency of ISIS or Daesh terrorist group informed its users about a huge compromise in the security of its website. They said Anonymous Hackers Hacked ISIS site which is now infecting thousands of users. When visiting the site, the following message keeps appearing:- “The site ahead contains malware, and that attacker might attempt to install

Read More
Scareware scammers lock iOS Safari

Scareware scammers lock iOS Safari

Scareware scammers lock iOS Safari Scareware scammers lock iOS safari to extort ransom money from iOS users. As researchers Andrew Blaich and Jeremy Richards at the San Francisco- firm explain in a blog post based mobile security: “The user reported that he had lost control of Safari after visiting a website and was no longer

Read More

Sensitive Information Leaked Publicly

Sensitive Information Leaked Publicly “Think twice before you click” We often shared to computer users to help them protect from unreliable links and malware infected email links. Wait a moment and look at the pop-up “Do not show this message again”. This is a warning message which we face daily. It is trying to say

Read More

How to generate Word list using Crunch ?

How to generate Word list using Crunch ? How to generate Word list using Crunch ? In our previous blog, we discussed about how to hack or recover any unknown passwords. In this blog, we will tell you how to generate word list using Crunch. In password cracking, we often need to use a word

Read More
Crack Any Password And Identify Unknown Password

Crack Any Password And Identify Unknown Password

Crack Any Password And Identify Unknown Password Crack Any Password And Identify Unknown Password. Password Cracking refers to guess or crack passwords to gain access to a computer system. It is a common approach to identify an unknown or forgotten password. Password crackers will usually use a variety of tools, scripts or software to crack a

Read More
USG Protects Hacking Attacks

USG Protects Hacking Attacks

USG Protects Hacking Attacks USG Protects Hacking Attacks. Do you ever feel the need for a hardware firewall for your USB ports? USG v1.0 is one such effective device that users can use to identify the maliciousness stored on suspicious USB drive. It is fully open firmware and two STM32F4 microprocessors make this possible. So,

Read More
Student Hacked Professors’ Emails

Student Hacked Professors’ Email

Student Hacked Professors’ Email Student Hacked Professors’ Email. A University has expelled a student for hacking their several Professors’ email. Technion Institute of Technology, a public research institute based in Haifa, Israel, revealed the disciplinary actions it took against the student to Ynetnews: “We are taking this case very seriously, as it is very unusual. The student, who

Read More
US Air Force documents backup leaks

US Air Force documents backup leaks

US Air Force documents backup leaks US Air Force documents backup leaks. Sensitive information of United States Air Force got exposed publicly on Internet. It allows anyone to use them without any authorisation and password. Only via web connection anyone can access it. Security researchers at MacKeeper discovered that they found gigabytes of files on

Read More
Popular Smartphone Infected with Malware

Popular Smartphone Infected with Malware

Popular Smartphone Infected with Malware Want to buy a new android Smartphone? Or Already bought new android Smartphone? Do not expect it to be a clean sheet. Popular Smartphone Infected with Malware.  Pre-installed android malware found in 36 Smartphone’s. Popular manufacturing companies like Samsung, LG, Xiaomi , Asus, Nexus, Oppo and Lenovo distributed by two

Read More
Fortune 1000 Companies Vulnerability

Fortune 1000 Companies Vulnerability

Fortune 1000 Companies Vulnerability Fortune 1000 Companies Vulnerability. A recent report reveals about the Fortune 1000 Companies Face Data Breaches. This Fortune 1000 company suffer twice the amount of data breaches their peers. BitSight’s latest report revealed “How Secure Are America’s Largest Business Partners? and Rating Cybersecurity Performance of Fortune 1000,” companies which are part

Read More
DNA Digital Data Storage

DNA Digital Data Storage

DNA Digital Data Storage DNA Digital Data Storage. Usually , You all have heard about computer storage devices like floppy disks, USB flash drives, memory cards, memory sticks, tape cassettes, zip cassettes, computer hard drives, CD’s and DVDs etc Have you ever heard about DNA storage? Yes, Researchers are discovering and investing lots of efforts into new storage

Read More
Bypass Google’s ReCaptcha v2 anywhere

Bypass Google’s ReCaptcha v2 anywhere

Bypass Google’s ReCaptcha v2 anywhere We can easily Bypass Google’s ReCaptcha v2 anywhere on the web . Yes, you heard it right. ReBreakCaptcha is a new bypassing technique for Google ReCaptcha v2. The three steps of ReBreakCaptcha :- Audio Challenge Recognition – Converting the audio and sending it to Google’s Speech Recognition API. Verification –

Read More
Scam iTunes Receipt Found

Scam iTunes Receipt Found

  Scam iTunes Receipt Found Scam iTunes Receipt Found.  Want to go for a Movie?  Everyone loves to.  But before booking the Movie Ticket you should check whether it’s legit or not. Yes, you heard it right. A new campaign started a fake iTunes for buying movie tickets online and taking Apple users sensitive information.

Read More
Web mail disasters

Web Mails disasters

Web Mails disasters Web Mails disasters. Checking mails is the regular schedule in everyone’s daily life. But one hacker will think who else has read his emails. Sounds Strange? It’s obvious. If you used a web based email services like Gmail, Outlook365 , the answer can be shocking. Have you ever seen after reading your

Read More
Android Malware to hack Bank Accounts

Android Malware Hack Bank Accounts Credentials

Android Malware Hack Bank Accounts Credentials Android Malware  Hack Bank Accounts Credentials. Few Days back a New Android Banking Malware ESET discovered on Google Play was spotted. Recently one more Malware was spotted which is targeting banks and taking their important credentials. Through investigation, threat has uncovered its code which was build using source code was

Read More
Ransomware targets Mac

MacOS under Ransomware attack

MacOS under Ransomware attack MacOS under Ransomware attack. Crypto-ransomware is more popular nowadays and is more common amongst cybercriminals. Mostly it affects windows systems  but also affected Linux or macOS in 2016 like  KillDisk affecting Linux and KeRanger attacking OS X. We have seen a new Ransomware campaign for Mac, last week. This new ransomware, written in Swift, is

Read More
SBI Vulnerability Exposed

SBI Vulnerability Exposed

SBI Vulnerability Exposed SBI Vulnerability Exposed….A One-Time Password (OTP) is an automatically generated numeric or alphanumeric string of characters that authenticates the user for a single transaction or session. An OTP is more secure than a static password, especially a user-created password, which is typically weak. OTPs may replace authentication login information or may be

Read More
Google Disclosed Microsoft vulnerability

Google Disclosed Microsoft Vulnerability- Microsoft’s Delay Their Latest Updates

Google Disclosed Microsoft Vulnerability- Microsoft’s Delay Their Latest Updates                 Google Disclosed Microsoft Vulnerability and in the eleventh hour Microsoft decided to delay their latest updates. All Windows users are so accustomed on getting updates on windows gadgets and waited for their latest updates to come on public…On Second

Read More
hacking your voice

Hacking your voice to perform social engineering attack

Hacking your voice to perform social engineering attack Hacking you voice is real and possible as Hackers can use photoshopping voiceover . An engineer’s dream is “project voco” where the software allows the controller to edit and insert words into an audio recording without bringing back the original vocalist back to the studio. Hacking your

Read More
mongo db databases

Mongo DB Databases hijacked

Mongo DB Databases wiped out Mongo DB databases had been kidnapped by the hackers. The hackers have deleted mongo DB databases from the company servers and are demanding ransom for safely return of the information. The victims are hospitals, small businesses and educational institutes. Nearing 27,000 database could be hacked. There are security measures built

Read More

WiFi phishing attack

WiFi phishing attack – You can be the next target? Wifi phishing attack is the next level attack even though the wifi in modern days are secured with wifi Protected Access II (WPA2) a security protocol which has a strong cryptographic hash function to protect the pre-shared key (PSK). During a penetration testing it is

Read More
virtual reality

Virtual Reality – Are we thinking of Security?

Virtual Reality and its security Virtual Reality making it big in the market and every individual is keen to use it.  What we need to worry is its security? It is not a big target for hackers still now. Bulky prototype virtual reality devices were being tested in labs as early as 1960, but there

Read More

Dark Web

Dark Web – The internet beyond Google   Dark Web which is indeed a very interesting topic to talk about as due to recent hacks and terrorist activities which took place took the help of the dark web. In this article, we will explain how one novice interest and curiosity can be dangerous in the

Read More
ransomware

Ransomware Top 10 list of 2016

Ransomware Top 10 list of 2016 Ransomware attack in corporate houses in 2016 was very common. Some ransomware attacked the critical infrastructure of organizations. Ransomware attacks panicked the entire corporate world. There are hundreds of ransomware families which came into lam light after they attacked many organizations. Some of the most dangerous ransomware of 2016

Read More

Internet Safety Manual for family & friends to support digitalization in India

Internet Safety Manual for family & friends   Internet safety manual or common hygiene to be maintained by common people while they are on the internet is really missing in India. We at Indian Cyber Security Solutions have taken the major step to educate the common people how to use internet safely. Do`s and don’ts

Read More
Hacking Sony security cameras

Sony IP Cameras are vulnerable to be Hacked

Hacking Sony security cameras by backdoor attacks   Hacking Sony security cameras took the industry by a storm. If you have a Sony IP based camera installed at your house or office premises you must be aware of this fact.   SEC Consultant researchers have found out a real flaw (0-day vulnerability) in Sony IP

Read More

IOT Devices and Cyber Security are major concern for the future

IOT devices are more vulnerable to hack   IOT devices and Cyber Security goes hand in hand. Every day there is increase in devices which are being connected to internet. Development in the field of machine learning and artificial intelligence had increased dramatically due to increase of interconnected devices and growth of IOT devices in

Read More

Ransomware attack on hospital forces the hospital authority to cancel 2,800 operations and completely shut down the system.

Ransomware attack on Hospital – New Blackmailer Game   Ransomware attack on hospitals had increased in recent past. With Locky Ransomware attacking the healthcare industry recently. Different industries had been attacked in India and abroad with ransomware. Numerous cases had been registered in India with Bangalore based IT companies are falling pray to ransomware. To

Read More
Russian central bank hacked

$31 million hacked from Russian Central Bank

Russian Central Bank Hacked – $31 million stolen from Bank Russian central bank hacked as millions of dollars of customers were stolen on Friday as disclosed by bank authority. This is the latest example of a planned cyber-attack on the financial institutions. After the Russian central bank hacked the officials came out with a stunning

Read More
pacemaker hacking

Pacemakers are the target for hackers

Hackers can target pacemakers Hackers can target pacemakers remotely as researchers have found security flaws in the device that can be exploited and hacked. Hackers can target the pacemakers remotely from a distance by sending malicious codes which can trigger fatal shocks can cause death. Using common equipment’s the researchers were able to find loopholes

Read More
winter training

Router hack makes 9,00,000 Germans go offline

Router hack makes 9,00,000 Germans go offline   Router hack forces 9,00,000 Deutsche Telekom customers offline on this Sunday and Monday.  Serious attempts were made to compromise  broadband routers and turn them into a botnet. Zyxel and Speedport router hack by malicious hackers as the vulnerabilities were exploited. Routers were coded to transform into botnet

Read More

Android Banking Malware uses social engineering to bypass battery saving process

Android Banking Malware  uses social engineering to bypass battery saving process   Android banking malware can stay connected with its control servers even after the android device is off.     Flaw in Doze functionality in Android     Doze is a power mode that activates once the android device haven’t been interacting with the

Read More
IPhone passcode bypass

IPhone passcode bypass – IOS vulnerability

 IPhone passcode bypass   IPhone passcode bypass is not new as attackers had been attacking your IOS devices and accessing your private data. IPhone users were exited as the new IOS 10 from Apple would prevent IPhone passcode bypass. Hackers got better of it and still can bypass the passcode of IOS 10.    

Read More
android trojan

Million Android users downloaded Trojan from Google Play Store

Android Trojan downloaded from Google Play Store   Android Trojan is now being downloaded by millions of users from the Google Play Store.  The Russian Security Agency “Doctor Web” found the malware popularly known as Android.MulDrop.924. The new Android Trojan disguise itself as games and other apps in Google play store.  The Android Trojan can

Read More

Pupy RAT

Pupy a Killer RAT   Pupy is an open source Remote Administration Tool which have an embedded Python interpreter. It is a cross platform based interpreter which allows to load Python packages from memory and access python objects. As it uses reflection dill injection in windows leaving no traces of it on the disk. Due

Read More
facebook spam

Facebook spam – New way to hack Android Devices – Be aware

Facebook spam to hack your android devices   Facebook spam with a news of DONALD TRUMPH dead in a heart attack is new way to hack into your android device.   What it Does ? Victims if click on the Facebook spam post are redirected to new page and the phone starts vibrating. Victim is

Read More
sms phishing

SMS phishing scam to hack into Apple ID

SMS phishing scam to hack into Apple ID   SMS phishing also known as smishing is not new to the world of technology. We at Indian Cyber Security Solutions think that this SMS phishing scams are increasing in huge numbers and victims have no clue how to be safe. In this article today we will

Read More
Tesco bank

Tesco Bank Hacked

Tesco Bank Hacked – 20,000 Accounts are compromised by a Black Hat Hacker   Tesco Bank Hacked as over 20,000 bank accounts of customers where compromised in United Kingdom. After the Tesco bank hacked bank authority had frozen all online transactions from those accounts. Tesco bank hacked had forced the bank authority to implement a quick contingency

Read More
DDoS attack

DDoS attack

DDoS attack set Liberia out of internet- culprit Mirai Botnet   DDoS attack had put the whole country of Liberia under distress, when people of the country could not access to internet. The culprit used Mirai malware to shut down the internet of insecure IoT devices. Mirai malware is remotely controlled by the bots, the systems

Read More

Linux is hacker’s first choice

Linux is hacker’s first choice Linux is hacker’s first choice as it is an operating system that is based on open source. By open source we mean, the user or the programmer can use source code that has been applied to design Linux as per programmers or developers requirement. Hence one can easily modify the

Read More

Whatsapp Hacking – Your Privacy is at STAKE !!

Whatsapp Hacking – Your Privacy is at STAKE !! Whatsapp Hacking is an interesting topic where all are interested to know in details. Today we will unleash the real details and how a hacker can conduct a watsapp hacking remotely and you will not be aware of it. Black hat hackers are always  one step

Read More

Top 5 hacking software

Top 5 hacking software – Be a Hacker Top 5 hacking software which are available for free.  You can use them without paying a single rupee. These hacking software’s are used all over the  globe. IT security professionals do use them. There are many paid and licensed version hacking software used by MNCs but it

Read More
Icloud hacking

Man Hacked Apple iCloud & Gmail accounts of 30 celebrities in Loss Angeles.

Email Phishing scam does the trick for the Hacker. Email phishing is a very old technique used by hackers to get the log in credentials of the victim. On September 23rd 2016 a man hacked into iCloud and Gmail accounts of 30 celebrities in Loss Angeles.  As per the report the hacker conducted the email

Read More
android ransomware

Android Ransomware Attack the new terror

ANDROID RANSOMWARE USING PSEUDORANDOM PASSCODE Android Ransomware is not new to the world and it had infected many android devices in the recent past but a new version of Ransomware is much more powerful. Attacks on android devices had increased heavily as more sensitive data is now stored in the small portable device which is

Read More
us election

FBI confirms hacking attempts on U.S election system

Hackers targeting the election system of United States US Election system is under contentious scanning an efforts of the hackers to hack into it as per FBI. Over the last one month the voter registration database of states of US is under cyber attack. Mr. Comey (Director FBI)  did not say whether those hacking attempts

Read More
website hacked

Armenian hackers hacks into Banks and Military data of Azerbaijani

Armenian hackers leaked personal data of government officials and  also defaced embassy sites to celebrate 25 years of independence Armenian Hackers from MMCA – Montel  Melkonian Cyber Army claim to have hacked into Azerbaijani banks, military and police servers. They have leaked several confidential data and made it public just to celebrate their 25th independence.

Read More

Phishing scam targets Godaddy customers

 Phishing scam targets Godaddy customers Phishing scam to steal user’s personal data or financial credentials Phishing scam to steal user’s personal data or financial credentials is nothing new and this time GoDaddy users are the victim of it. With each day the cyber scammers are coming up with more inventive and compelling ways to out

Read More

ATM Hacking in Thai Banks

ATM Hacking in Thai Banks ATM Hacking in Thai Banks!!!! A staggering 12.29 million Baht ($350,000) stolen. So after Japan, it’s Thailand. The hacking spree continues. Just a couple of months back cyber criminals had successfully stolen 1.44 billion Yen ($13million) from more than 1400 ATMs in just over 2 hours and fled from the

Read More
Unreal Tournement Hacked

Unreal tournament gaming hacked, Epic gaming forum hacked

Unreal tournament gaming hacked Unreal tournament gaming hacked, Epic gaming forum hacked!!!! Till now the gamers have ‘hacked’ their way through the game but now the gamers themselves have been compromised by a real band of hackers. It seems that more than 8, 00,000 forum accounts of Unreal Engine and its creators Epic Games’ forum

Read More

Locky Ransomware threat in Healthcare Industry

Locky Ransomware threat in Healthcare Industry Locky Ransomware, as it is called is causing great adversities for health centres and hospitals in the United States. Yes, malicious actors and scammers are employing the highly advanced Locky Ransomware there which penetrates infecting the entire system in a very short span of time by using the file

Read More

Volkswagen Vulnerability found in VW Cars

Volkswagen Vulnerability found in VW Cars Volkswagen vulnerability this time!! Even cars of the standard and stature of Volkswagen cannot evade vulnerability from hacking these days. Such is the susceptible cyber security scenario in the world at the moment. These kind of hacks along with system compromise, data breaches and other form of cyber crimes

Read More
Android Devices

Android devices vulnerable to Linux Kernel flaw

Android devices vulnerable to Linux Kernel flaw Android devices running Android 4.4 KitKat and higher are vulnerable to a recently disclosed Linux Kernel flaw and guess what even the latest, updated and improved technology of Android Nougat Preview also seem to have not been able to evade it. This vulnerability is estimated to be present on

Read More

Dota 2 Forum Hacked

Dota 2 Forum Hacked Dota 2’s (Defense of the Ancients 2) official forum has suffered a serious setback with close to 2 million registered user’s personal information being stolen. Dota 2 is a multi-player online battle arena video game. E-mail and IP addresses, usernames, user identifiers and hashed passwords were accessed and stolen. This massive

Read More
Android Security

Push notification enhances android security

Push Notification Enhances Android Security Push notification is Google’s next endeavour in keeping its security as tight as possible in Android phones. After the recent announcement of already implementing some vital security features in the next Android OS version Android Nougat it is now on its way to bring to the table a new feature

Read More

Israeli Hacker Hacks Again

Israeli Hacker Hacks Iranian ISP ‘Daba’ Israeli Hacker does it again, Iranians exposed to privacy breaches, yet once more!! The login credentials of thousands of online registered users of an Iranian Internet Service Provider (ISP) called Daba have been leaked earlier today by a hacker operating by the name of Zurael_sTz after who was able

Read More
ransomware

Combating Ransomware

Combating Ransomware Attack – Europol takes initiative to fight back Ransomware has been something that has been bothering and affecting individuals and companies very badly for quite some time now. It’s a type of malicious software that is designed to block access to a computer system until a sum of money is paid as deemed

Read More
Gmail security

gmail hacking

Gmail Hacking and Security Tips Gmail hacking is very common and this is how many underworld hacking communities are gaining access to millions of gmail accounts. Google had taken many steps but it seems that hackers are always one step ahead of them. Due to lack of awareness many high ranked government officials and high

Read More
Android Nougat Security review

Android Nougat

  Android Nougat-Will it be ‘sweeter’ than Marshmallow Google is raising the bar with the latest version of its mobile operating system named Android Nougat after so many names were suggested for the same from all over the tech world and social networking sites following the trend of keeping its name after a sweet which

Read More

Web Application Firewall Testing

Test your Web Application Firewall NOW before its too late   A form of firewall covering the control of input/output & access from, to, or by an application or service is called application firewall or in full term web application firewall (abbreviated as WAF). They are of two types i) Network based and ii) Application

Read More

Do not leave it to your assumption

Show Buttons
Hide Buttons