Ransomware and malicious crypto miners in 2016-2018

Ransomware is not an unfamiliar threat. For the last few years it has been affecting the world of cybersecurity, infecting and blocking access to various devices or files and requiring...

Deep Web Onion Links Grand List 2018 [8000+ Categorized Links]

If you don’t know TOR, or how to configure TOR, read my tutorial on TOR. If you are new to deep web, or you don’t know much about DW, I highly recommend...

Pbot: evolving adware – Securelist

The adware PBot (PythonBot) got its name because its core modules are written in Python. It was more than a year ago that we detected the first member of this...

Why your Birth Date is Important to HACKERS?

Even today, several online services ask users to submit important personal data such as their birth dates. This may be done for keeping records, for ensuring that a user is...

Wrong Permission Delegation Can Dismantle Your Whole Active Directory!

Active Directory Permissions are similar to file system permission we set every day on our servers. UI is almost exactly the same, the permission names are obviously a little bit...

Modern OSs for embedded systems

At Kaspersky Lab we analyze the technologies available on cybersecurity market and this time we decided to look at what OS developers are offering for embedded systems (or, in other...

How To Hack Android Phone Using Another Android Phone Remotely 2018

Airdroid Airdroid  is basically used for transferring files over distances and sharing of resources can be easily done with Airdroid, also you can also have remote access to other devices ....

Olympic Destroyer is still alive

In March 2018 we published our research on Olympic Destroyer, an advanced threat actor that hit organizers, suppliers and partners of the Winter Olympic Games 2018 held in Pyeongchang, South...

Deep Web Onion Links Grand List 2018 [8000+ Uncategorized Links]

If you don’t know TOR, or how to configure TOR, read my tutorial What is TOR?. This huge list of uncategorized deep web links is what you need to explore the...

Top Best Hacking Tools For Linux, Windows And Mac OS X 2018

Hacking is the process of hacking into systems may it be websites, operating systems, computers, phones or anything. Literally, but its not even that easy, as you might be thinking....

LATEST NEWS

MUST READ