This software project is a result of a Bachelor’s thesis created at SCHUTZWERK in collaboration with Aalen University by Philipp Schmied.Please refer...
Here we are going to have a look about some of Common & important Penetration Testing Checklist for widely used OS Platforms...
The developers behind the privacy-minded Zcash cryptocurrency have recently discovered and patched a highly dangerous vulnerability in the most secretive way that...
For all of the undeniable conveniences the Internet has brought us, it’s becoming an increasingly dangerous place to be. Both individual hackers...
Using an Android device? Beware! You have to remain more caution while opening an image file on your smartphone—downloaded anywhere from the...
Synopsisbscan is a command-line utility to perform active information gathering and service enumeration. At its core, bscan asynchronously spawns processes of well-known...
Ever sent a message on Facebook Messenger then immediately regretted it, or an embarrassing text to your boss in the heat of...
With so many data breaches happening almost every week, it has become difficult for users to know if their credentials are already...
You’ve always been warned not to share remote access to your computer with any untrusted people for many reasons—it’s basic cyber security...
It’s 2019, and just opening an innocent looking office document file on your system can still allow hackers to compromise your computer....
Bolt is in beta phase of development which means there can be bugs. Any production use of this tool discouraged. Pull requests...
netsniff-ng is a free Linux networking toolkit, a Swiss army knife for your daily Linux network plumbing if you will. Its gain...
A 20-year-old college student who stole cryptocurrency worth more than $5 million by hijacking victims’ phone numbers has pleaded guilty and accepted...
Just because an app is available on Google Play Store doesn’t mean that it is a legitimate app. Despite so many efforts...
QuadrigaCX, the largest bitcoin exchange in Canada, has claimed to have lost CAD 190 million (nearly USD 145 million) worth of cryptocurrency...
fwknop implements an authorization scheme known as Single Packet Authorization (SPA) for strong service concealment. SPA requires only a single packet which...
Many of you might have this question in your mind: “Is it illegal to test a website for vulnerability without permission from...
Mac users need to beware of a newly discovered piece of malware that steals their web browser cookies and credentials in an...
The United States Department of Justice (DoJ) announced Wednesday its effort to “map and further disrupt” a botnet tied to North Korea...
European airplane maker Airbus admitted yesterday a data breach of its “Commercial Aircraft business” information systems that allowed intruders to gain access...
Late last year when an unknown group of hackers stole secret access tokens for millions of Facebook accounts by taking advantage of...