Browsing category

Geek

Agent Smith Android malware has infected 25 million devices so far

Agent Smith malware exploits Android vulnerabilities to target unsuspected users for credential stealing. The IT security researchers at CheckPoint have discovered a new variant of smartphone malware whose primary target is Android devices and so far the malware has infected more than 25 million Android devices. Dubbed “Agent Smith” by researchers; the malware identifies and […]

Twitter is down – Twitter’s website & app suffering outage (Updated)

As surprising as it may sound, Facebook is up but Twitter is down. The online news and social networking site Twitter is down right now after suffering a massive outage. This comes as a surprise since Twitter has a proven track record of maintaining its service even when social media giants like Facebook and Instagram […]

Vulnerability in Zoom video conference app lets Mac’s camera hijacking

The vulnerability in the Zoom video conference app lets attackers hijack Mac’s camera by merely using malicious websites. The Zoom video conference app is currently being used by millions of users around the world and that makes it a lucrative target for cybercriminals. Jonathan Leitschuh, an IT security researcher has discovered a critical zero-day vulnerability […]

9 Best Linux Distros For Beginner Users — 2019 Edition

Are you looking for a Linux distro that’s suitable for new users who are willing to start an exciting Linux journey? Well, you’re in the right place. The beauty of Linux lies in the plethora of options available to the users. While some call it Linux distro fragmentation, I love to call it Linux’s strength. It […]

Popular Android Zombie game phish users to steal Gmail credentials

The app made its way to Google Play Store was also found phishing users for Facebook credentials. Scary Granny ZOMBY Mod: The Horror Game 2019 is the latest game on Google Play Store that is condemned by the digital security fraternity for sneakily stealing personal data from unsuspecting users. The game, which has been downloaded […]

ViceLeaker Android malware steals call recordings, photos, videos & texts

Israeli Citizens are the Primary Target of New Android Mobile Spying Campaign Using ViceLeaker Malware, says Kaspersky. Kaspersky Lab researchers discovered an Android malware campaign active since 2016 and still going strong. Dubbed ViceLeaker; researchers claim that it is the product of a group of hackers that is specifically targeting Middle Eastern and Israeli citizens. […]

New Windows 10 bug causes PCs to take longer to shut down

Windows 10 bug: If you have a device connected via cable to the USB Type-C input, you may have to wait another minute to turn off your computer – The bug exists in USB Type-C Connector System Software Interface (UCSI) software. The new bug in Windows 10 is not a serious one, but it somewhat […]

7 Easy-to-Use Java Performance Tuning Tips

Are you looking for easy-to-use Java performance tuning tips because you want to learn more developer knowledge and experience because of the current over-complicated process of optimization techniques? With a bit of practice, there are a few easy ways to learn best practices that allow you to build and optimize a well-designed and executed application. […]

New cryptomining botnet malware hits Android devices

The new malware exploits Android Debug Bridge (ADB) ports. In a research conducted by the Tokyo-based cybersecurity and threat defense firm Trend Micro, it was revealed that there is a new cryptomining malware bot that’s particularly targeting Android devices. The miner exploits the Android Debug Bridge port system of the device that performs the function […]

Cellebrite claims its new tool unlocks almost any iOS or Android device

Cellebrite is the same company which helped the FBI to unlock iPhone device of San Bernardino shooter. Renowned Law Enforcement contractor, the Israel-based forensics firm Cellebrite has claimed that they have developed a perfect tool to hack almost every high-end Android and iOS device, which is definitely good news for law enforcement agencies. In a […]

Instagram down: Social networking site suffering service outage

Instagram down? You are not alone; Instagram is down for everyone. Another day, another service outage at social media giant Facebook. Yes, the photo and video-sharing social networking service Instagram has been hit by a worldwide service outage forcing its website and applications to go offline. According to the Instagram’s outage map displayed on DownDetecter, […]

How to Remove Temporary Files In Windows 10?

Over time, temporary files can accumulate and take up storage space. If you want to free up storage space, you can delete temporary files – Here’s how to remove temporary files in Windows 10. Temporary files, which are usually referred to as Temp files, are junk files that are left behind after you have completed […]

Google confirms presence of Triada backdoor in cheap Android phones

Triada Banking Trojan came Preinstalled as Backdoor in Budget Android Smartphones- Google Confirms. It would probably be the first time ever in Google’s history that the company has revealed details of the tenacity and success of malware dubbed as Triada. Triada malware was discovered in 2017 and came pre-installed on Android devices. It was believed […]

10 Best Raspberry Pi Alternatives Comparison: x86 And ARM SBCs For 2019

In the search for the best Raspberry Pi alternatives, we often forget that the original Pi-SBC is arguably one of the most versatile pieces of hardware. The Raspberry Pi 3 B+ stays true to its $35 price tag and offers unmatched adaptability. However, most of us like having options. It is one of the reasons […]

MetaTrader 4 vs MetaTrader 5 iPhone app

If you are an online trading enthusiast, you can use MetaTrader 5 and MetaTrader 4 iPhone apps to trade forex. Though the prime objective of MetaTrader 4 iPhone app and MetaTrader 5 iPhone app is to enable users to have great trading experience, these forex trading apps vary in several ways. Here is a comparison […]

Google may limit ad blockers for Chrome users

Google May Limit Ad blockers for Regular Users Amidst Criticism from Consumer Advocates. Google Chrome is perhaps the most popular of all web and mobile browsers at the moment, and this popularity is a result of various user-friendly features that it offers. However, the recent decision of Google to deactivate most of the ad blockers […]

Teen hacked Apple twice hoping for a job

He hacked his way into the tech giant’s mainframe by creating false credentials. Now that is what we call a very unorthodox approach, an out of the box invocation to realize what you are desperately after. An Australian teenager, an Apple fanboy, longing for a job in Apple evinced an unusual way of forwarding his […]

6 Open Source Android Alternative Operating Systems For Mobiles

In the wake of the ongoing US-Huawei-Google tussle, many Android enthusiasts are wondering about the different alternative phone operating systems that are out there. We have Apple’s iOS at our disposal, but the cost of owning an iPhone makes it an impossible choice for many. This prompted me to create a list of other Android […]

Google bans Huawei from accessing Android & its licensed apps

Intel Corp., Broadcom Inc., Qualcomm Inc., Xilinx Inc., etc., have also refused to supply critical components and software to Huawei. The US has decided to deny Huawei Technologies Co., a major Chinese tech firm, access to US technology to prevent Huawei’s growing influence in the country’s consumer device market. Immediately after the news about the […]

9 Best Kali Linux Tools For Hacking And Pen-Testing In 2019

Linux-based distros are the most preferred platforms for ethical hacking. Specifically, open source operating systems like Kali Linux Tools and Parrot are very popular among security researchers. They come with a long list of hacking tools with Terminal and GUI interfaces. In this article, I’ll be listing the best Kali Linux tools for 2019 that […]