Home Technology - Hacking

Technology - Hacking

Technology news and blogs

The fourth horseman: CVE-2019-0797 vulnerability

The new zero-day in the Windows OS exploited in targeted attacks In February 2019, our Automatic Exploit Prevention (AEP) systems detected an attempt to exploit...

Why it’s time to strenghin your passwords

By Marissa Miller | Feb. 25, 2019 https://mic.com/articles/192829/how-to-strengthen-your-passwords Forgetting your password can be a serious hassle — you need to verify your account, remember your high school teacher’s pet’s middle name,...

New Mirai Malware Targeting Enterprise Wireless Presentation Systems

Mirai malware is a powerful strain that compromises a number of Linux devices and uses those devices to launch a massive distributed denial of service attacks. The new malware variant targets...

Vulnerability in Facial Recognition of Samsung S10 Variants

Experts have demonstrated that facial recognition in modern devices is unsecured and can be circumvented through simple tricks such as displaying an image or a video before a device. Samsung’s newest...

[SCAM OF THE WEEK] Phishing Attack Warns About Boeing 737 Max Crashes And Infects...

  Large airline crashes tend to uniquely focus almost everyone's attention. Lowlife internet criminals are exploiting the fear connected to these incidents, and leverage it in phishing attacks. A new campaign is...

iKeyMonitor: Best Android Keylogger App in 2019

iKeyMonitor is a professional Android keylogger...

Why it’s time to strenghin your passwords

By Marissa Miller | Feb. 25, 2019 https://mic.com/articles/192829/how-to-strengthen-your-passwords Forgetting your password can be a serious hassle — you need to verify your account, remember your high school teacher’s pet’s middle name,...

The fourth horseman: CVE-2019-0797 vulnerability

The new zero-day in the Windows OS exploited in targeted attacks In February 2019, our Automatic Exploit Prevention (AEP) systems detected an attempt to exploit...

[SCAM OF THE WEEK] Phishing Attack Warns About Boeing 737 Max Crashes And Infects...

  Large airline crashes tend to uniquely focus almost everyone's attention. Lowlife internet criminals are exploiting the fear connected to these incidents, and leverage it in phishing attacks. A new campaign is...

Counter-Strike vulnerabilities Exploited by Malicious Servers

Hackers exploiting zero-day vulnerabilities in Counter-Strike 1.6 game client to infect player’s devices by using a malicious gaming server and downloads malware into their devices. The Counter-Strike game was decades old...

APLICATIONS

FBI warns of global ATM cyber crime spree –

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: ABC News The FBI has issued a warning to...

Benefits of Product-mode

HOT NEWS