WhatsApp & Telegram Accounts Compromised By New Vulnerability that Allowed Hackers to Take over...

Checkpoint Researchers Compromised Both Whatsup & Telegram chat applications which served by End-to -End Encryption.Both application designed with strong encryption that won't allow to read anyone except the people who communicate originally. Checkpoint Proved that the same mechanism has also...
VBA Macro

Hackers Distributing Malicious RTF Excel Sheets Document and Installing RAT using VBA Macro code

A recently discovered RTF documents that contain malicious VBA Macro code distributing to infect the windows users with dangerous Remote access Trojan ( RAT ). NetwiredRC and Quasar. NetWiredRC and  Quasar is a remote access Trojan that used by cyber-criminals to gain...

Auto Clicking “GhostClicker” Playstore Android Adware Found in 340 Apps with 5...

Auto Clicking Android Adware called "GhostClicker" Found in Google Play Store from 340 Android Apps Especially “Aladdin’s Adventure’s World” game which contains same auto Clicking Adware was Downloaded more than 5 Millions times. Current scenario revealed that, Android Platform is...
Netgear R7000 and R6400

Stop using Netgear R7000 and R6400 to Avoid getting Hacked

Netgear R7000 and R6400 and possibly other models may be vulnerable to Injection attacks, which can be exploited by remote attackers to run malicious scripts with Root privileges. Description The Carnegie Mellon University CER disclosed  this critical bug (Vulnerability Note VU#582384) with the two popular...
Identity Thief

Most Important Steps to Prevent Your Organization From Identity Theft – Detailed Explanation

Identity theft by Identity Thief is the ponder utilization of another person's character, it is a genuine wrongdoing(a serious crime). Identity Thief utilizes data about anybody without their consent. They could utilize name and address; Visa or financial balance numbers; Social Security...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended