car alarm

Hack the Car in Real Time – Car Alarm Flaw let Hackers Remotely Hijack...

Researchers discovered a serious Vulnerability in famous vendors car alarm system that allows attackers to hijack the car remotely and kill the engine while driving, even steal the car. These alarms available in the...

SHAREit App Vulnerabilities Allows Hackers to Bypass Android Device Authentication & Download Arbitrary Files...

Researchers recently discovered 2 new critical vulnerabilities in the SHAREit App lets attackers bypass the Android device authentication mechanism and download the arbitrary files in victims device. SHAREit is data sharing cross-platform application for...
mobile security

How to Keep Your Mobile Safe from Cyber Threats

Before smartphones were popular, people didn't take mobile security much seriously. After all, we used to have a few contacts, some classic games, and some blurred wallpapers, what was actually stored on our old mobile phones?
ExileRAT

Hackers Launching Powerful Malware ExileRAT Via Weaponized Microsoft PowerPoint Document

Researchers observed a new malicious campaign that delivers a powerful ExileRAT malware via Microsoft powerpoint documents using previously used C2 server infrastructure. Attackers deliver the malware via Email attachment and the Mail address represented...

Rising Threats in CyberSpace – Organizations Must be Prepared to Experience

Recently we have seen more increase in various threats and the ways of intruding the network and there were increase by APT groups. Mostly because of political agenda, cyberespionage, cyberwars, competitions and more of script...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended