Home General

General

Everything general about this

Wireshark 3.0.5 Released with the fix for Several Vulnerabilities

Wireshark 3.0.5 has been released with the new Qt version and fix for other vulnerabilities. The Qt is the library used in Wireshark to build the UI. The Wireshark is the...

Oh there it is, Facebook shrugs as Free Basics private key found to be...

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: The Register Facebook has insisted that losing control of the private key used to sign its...

PDF Phishing Attacks Using Microsoft OneDrive Surge Nearly 200%

Scammers use a mixture of familiar brand, unsuspecting users, legitimate document types and locations, and credential harvesting in this attack aimed at getting into your Office 365. If a cybercriminal can...

Gathering Pricing Intelligence for Your Business

Data scraping has become very common...

Week in security with Tony Anscombe

A nationwide data leak is believed to affect almost all citizens of Ecuador, putting them at risk of identity theft Almost every single citizen of Ecuador is thought to be affected...

Semi‑annual balance of mobile security 2019

Malware detections for iOS increased, as did the number of vulnerabilities detected in this operating system, while in the case of Android, the number of reported vulnerabilities decreased, although the...

Team Spotlight: User Operations

Since 2011, the Blockchain team has been creating products that empower people to store and use cryptocurrencies to make an impact across the world. It’s our bread and butter. The...

New Instagram Data Leaking Bug Let Hackers to Access Account Details

Facebook confirmed a new Instagram data-leaking bug that puts user data under risk. The vulnerability lets hackers access sensitive information such as account details and phone numbers. The vulnerability in Instagram...

HiddenWall – Create Hidden Kernel Modules

HiddenWall is a Linux kernel module generator used to create hidden kernel modules to protect your server from attackers. It supports custom rules with netfilter (block ports, hidden mode, rootkit...

FBI warns of romance scams using online daters as money mules

Up to 30 percent of romance fraud victims in 2018 are estimated to have been used as money mules Scammers are using dating sites and apps not only to scout for...

APLICATIONS

Unpatched Spoofing Flaw in UC Browser Exposes 600M Users to Phishing

An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to Phishing...

HOT NEWS