Security Hacker

Kali Linux 2018.4 Released with New Hacking Tools & Tool Upgrades – Its Available to Download Now

Kali Linux 2018.4 released with updated hacking tools and released new updates for already available tools along with a number of…

6 years ago

Windows Defender Antivirus Now Run Within a Sandbox To Isolate the Advanced Threats

Microsoft has moved ahead into a new milestone for its Windows Defender Antivirus and now it is running within Sandbox…

6 years ago

New DemonBot Attack Hadoop Clusters to Performing DDoS Attacks using Powerful Cloud infrastructure servers

New Botnet called DemonBot targeting Hadoop Clusters in order to perform DDOS attack using powerful cloud infrastructure. Hadoop is an…

6 years ago

New Malware Abusing Two Legitimate Windows Files to Steal Victims Personal Data

Researchers discovered a new malware that abusing two legitimate windows files and use it against compromised victims to steal sensitive…

6 years ago

New Android Malware Turns Your Mobile Devices into Hidden Proxies

Cyber criminals distributing new Android malware via Phishing email campaign that turns infected smartphones into hidden mobile proxies. This malicious…

6 years ago

5 Homeland Security Technologies That Might Be Commercialized

The federal government spends an upwards of $1 billion each year on unclassified cybersecurity research.  This fuel a part of…

6 years ago

Tesla Car Has Been Hacked and Stolen By Intercepting the Signal From Key Fob

Hackers steal a Tesla Model S car by intercepting the signal from car's key fob with a tablet to unlock…

6 years ago

Hackers Breach HealthCare.gov System and Steals Sensitive Personal Data of 75,000 Customers

Hackers compromised the computer system that interacts with the HealthCare website used by insurance agents to directly enroll the customers…

6 years ago

DarkPulsar – A Shadow Brokers Group’s New Hacking Tool Leak To Open Backdoor & Provide Remote Control

Shadow Brokers Hacking Group's new administrative module Tool called DarkPulsar Leaks with persistance backdoor to provide remote control to the…

6 years ago

Java Usage Tracker Critical Flaw Enable Hackers to Inject Arbitrary Files on Windows Systems

Newly discovered critical vulnerabilities in Java Usage Tracker allows the attacker to run arbitrary files in a vulnerable windows machine…

6 years ago