News

Latest news around the world

Indian iPhones Beware – There is a New Malware in Town

Posted on July 16, 2018 at 2:44 PM The security researchers from Cisco’s Talos security division have identified yet another malware campaign that targets mobile devices in India. According to reports, the...

[Alert] New WordPress XSS Vulnerability Discovered

Are you running WordPress 4.2.0 to 4.5.1? Time to upgrade to 4.5.2! It was recently discovered that WordPress versions 4.2.0 to 4.5.1 are vulnerable against a reflected XSS vulnerability in a specific WordPress...

How to customize your favourite Android app?

In this article, we will be talking about a tool that allows you not to crack/hack your favorite android app/games...

Time Based Blind SQL Injection on MYSQL : How To Do Manually

Time-based techniques are often used to achieve tests when there is no other way to retrieve information from the database server. This...

IT Security FAQ 8: SSL? Https:// – how do you connect it? What info...

Secure Sockets Layer (SSL) is a cryptographic protocol designed to provide communications security over a computer network. SSL makes the communication safe between two points, and ensures that ”no one”...

Zombie Tsunami Mod Apk | HackeRoyale

Are you the one you love to be the villain of the story and want the villain to win over...

Top 10 Free iCloud Activation Bypass Tools – 2018

What Exactly Is An iCloud? The iCloud has a free storage space of about five (5) GB! This brilliant application was formally launched...

What is Cryptocurrency – Meaning, Trading, Mining, Exchange, Charts, Prices, List [2018]

Know all about what is cryptocurrency mining, meaning, trading, charts, prices, list, wiki here in this article. How cryptocurrency works.. The post What is Cryptocurrency – Meaning, Trading, Mining, Exchange, Charts,...

[Alert] New Magento Vulnerability – Unauthenticated Remote Code Execution

Are you running Magento version before 2.0.6.? Time to upgrade!It was recently discovered that all Magento versions before 2.0.6. (both Community and Enterprise Edition) are vulnerable against an unauthenticated Remote Code Execution. The vulnerability (CVE-2016-4010) could allow an attacker...

APLICATIONS

Why do we need two different formats of WIF (wallet import...

I know that a public key can be compressed. However, a public key and its compressed one have the same private key. Then...

HOT NEWS