top of page

Search


Julia: A language for the future of Cyber Security
Julia 1.0 was released in 2018. It is a language created to have both the high-level simplicity as python, but low-level performance as...


New Mobile based Creative Phishing Attack
A cybersecurity researcher who last month warned of a creative phishing campaign has now shared details of a new but similar attack...


New TLS encryption-busting attack also impacts the newer TLS 1.3
A team of academics has revealed a new cryptographic attack this week that can break encrypted TLS traffic, allowing attackers to...


Android Phones Can Get Hacked Just by Looking at a PNG Image
Are you using an Android Device ? Careful! You have to remain more caution while opening an image file on your smartphone—downloaded...


DHS Issues Emergency Directive to Counter DNS Hijacking Campaign
The Department of Homeland Security issued an emergency directive Jan. 22 to nearly all federal agencies mandating cybersecurity actions...


Exploiting Windows Using Microsoft Office DDE Exploit (MACROLESS)
DDE exploit also was known as dynamic data exchange, it allows data to be transferred between applications without any interaction from...


New iPhone Passcode Bypass Hack Exposes Photos and Contacts
Isn't it too amazing for a hacker to bypass the passcode or screen lock on iPhones? Jose Rodriguez, an iPhone enthusiast, has discovered...


Hackers Stole 50 Million Facebook Users' Access Tokens Using Zero-Day Flaw
Logged out from your Facebook account automatically? Well you're not alone… Facebook just admitted that an unknown hacker or a group of...


Wireshark can be crashed via Malicious Packet Trace Files
Wireshark is the world’s most popular network protocol analyzer. The software is free and open source. The vulnerabilities –...


Unicode Domain Phishing: How you can protect yourself
Even the most vigilant internet users are susceptible to this IDN homograph attack A new wave of Unicode Domain Phishing attacks are...


Black Hat 2018: Satellite Communication Systems Hackable
Black Hat USA 2018 which commenced on August 4 has seen some of the famous researchers putting out their research works. While all the...


USBHarpoon: How “Innocent” USB Cables Can Be Manipulated To Inject Malware
A researcher from SYON Security has managed to build a modified USB charging cable that will enable hackers to transfer malware on your...


New Android Malware Framework Turns Apps Into Powerful Spyware
Security researchers have uncovered a new, powerful Android malware framework that is being used by cybercriminals to turn legitimate...


Dark Tequila Banking Malware Uncovered After 5 Years of Activity
Security researchers at Kaspersky Labs have uncovered a new, complex malware campaign that has been targeting customers of several...


New Hacking Technique Used to Bypass Microsoft Office 365 Security
Over 10% of Office 365 users have been affected in the last two weeks by a phishing attack named PhishPoint. The technique has already...


A New .NET Ransomware Shrug2 Encrypts Files Around 76 Different Extensions
Malware authors find easy to develop malware using the Microsoft .Net framework, some infamous ransomware like SamSam, Lime and now...


Free Facial Recognition Tool Can Track People Across Social Media Sites
Security researchers at Trustwave have released a new open-source tool that uses facial recognition technology to locate targets across...


DeepLocker - Artificial Intelligence Powered Stealthy Malware
Artificial Intelligence (AI) has been seen as a potential solution for automatically detecting and combating malware, and stop cyber...


New WhatsApp Vulnerability Allows Hackers to Intercept and Change Message Contents
A new WhatsApp vulnerability could allow attackers to spread fake news appeared to be sent from the trusted contacts. WhatsApp is a most...


Google Android P is officially called Android 9 Pie
If you have bet on Peppermint, Pancake or Pastry for "P" in the next version of Google's mobile operating system, sorry guys you lose...
bottom of page