A small, very fast and powerful text extractor.It can extract text from any kind of file and includes the ability to find...
Adobe squeezes out one last batch of security fixes for 2015. Adobe has issued new versions of Flash to patch a load...
With 2016, just a few days away, let’s have a flashback of the top 15 security incidents that took place this year....
Short Bytes: BI has spotted a very attractive graph in Goldman Sachs’ yearly compilation. This graph tells us the most popular websites...
Crooks are targeting English and Portuguese speaking Facebook users with “Holidays special offers malware scam.” It’s that time of the year when...
North Korea is known as an authoritarian state but researchers have found their technological systems to be following the same path. Researchers...
Image: fossBytes Short Bytes: Ruby development team has released Ruby 2.3.0 – the first stable release of Ruby 2.3 series. It comes...
Chris Vickery, a security researcher who is known for finding leaked databases online claims he has found US voter registration records of 191...
After using malware on pedophiles, law enforcement authorities in the United States have decided to add Hard-Drive Sniffing Dogs in their units...
Ransomware is the latest tool in the cybercriminal’s arsenal, but it has to date largely been used to target consumers. Could it...
THERE WAS ONCE a time when people distinguished between cyberspace, the digital world of computers and hackers, and the flesh-and-blood reality known...
China’s legislature unanimously passed a controversial anti-terrorsim law on Sunday despite months of objections from major tech firms and Washington alike. Among...
Short Bytes: In the list of top 10 most pirated movies and TV shows of 2015, Interstellar tops the chart with over...
Images | Project Solus Short Bytes: Solus OS, pegged as the fastest booting Linux OS, was released in December. Shipping with Linux...
Coinbase website DDoSed by hacker group. A hacker group consisting of two hackers, @L7Crew and @An0CBR claimed to have brought down the Bitcoin exchange website Coinbase. The...
Short Bytes: A new flaw in the card transaction has been revealed by the German security experts. This flaw, capable of cloning...
As all of you know, reconnaissance is critical to being successful in a pentest or hack. Recon is where we gather all...
Mintcast adware uses user.js settings files for persistence.Two PUPs (Potentially Unwanted Programs) are secretly turning off Safe Browsing support in Firefox to...
The online hacktivist Anonymous claimed to have averted a terrorist attack in Italy planned by the so-called Islamic State (ISIS) or Daesh...
MyGov, a portal used for managing various Australian government services is asking users to turn off their two-factor verification while traveling abroad. Portal’s administrator...