AZORult Malware Abusing RDP Protocol To Steal the Data

Sophisticated AZORult Malware emerges in a new form with advanced information stealing modules that capable of stealing sensitive information from infected computers. AZORult is one of the well-known malware that...

Why it’s time to strenghin your passwords

By Marissa Miller | Feb. 25, 2019 https://mic.com/articles/192829/how-to-strengthen-your-passwords Forgetting your password can be a serious hassle — you need to verify your account, remember your high school teacher’s pet’s middle name,...

Pwn2Own Duo Hacks a Tesla – So They can Win it!

Posted on March 25, 2019 at 11:12 AM A pair of security researchers have hacked a Tesla Model 3 and drove away in their prize for the last day of Pwn2Own Vancouver. In...

What is XSS (Cross Site Scripting) ?

XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable and also it is one of the important vulnerability in OWASP TOP 10. What is...

What is XSS (Cross Site Scripting) ?

XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable and also it is one of the important vulnerability in OWASP TOP 10. What is...

Let’s spin Facebook’s Wheel of Misfortune! Clack-clack-clack… clack… You’ve won ‘100s of millions of...

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: The Register Facebook today admitted it stored “some” of its addicts’ account passwords in a plaintext...

I Still Didn’t See What You Did

More advice for detecting and avoiding sextortion scams Vox Emptoris: “Voice of the Customer” In my previous post, we examined a particular example of a sextortion scam, showing several indications that it was...

What is XSS (Cross Site Scripting) ?

XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable and also it is one of the important vulnerability in OWASP TOP 10. What is...

Two white hats hack a Tesla, get to keep it

The electric automaker is working to release a fix for the underlying vulnerability in a matter of days A duo of white-hat hackers have earned themselves a brand new Tesla Model...

Telegram Now Allows You to Delete All Your Private Messages

Telegram now landing into the peak of the privacy and let users delete their entire private messages from both sender and receiver side regardless of the time limit. Telegram is one...

APLICATIONS

Trivial Software Flaws Continue to Plague Networked Devices

Western Digital My Cloud NAS Devices Contain Multiple Vulnerabilities It’s 2018, but it feels like 2008.  I often reflect on how relatively simplistic the...

HOT NEWS