Ethical hacking training specialists from the International Institute of Cyber Security have reported the discovery of a new vulnerability in the Cisco...
Google receives tonnes of requests from copyright holders daily for removing infringing content. The company then analyzes the received requests and removes the content that violates copyright claims....
Windows 10 Timeline, which allows users to track documents and web pages that they have accessed in past, is now available as...
The new tool aims to help in an age when billions of login credentials are floating around the internet
Firefox is known for its resolve to offer a Google Chrome alternative that offers reliable privacy solutions as compared to the data-hungry...
A chrome extension that still available on Chrome Web Store steals the payment card information from website forms visited by the users....
Security researchers have found a Google Chrome extension which steals payment card information and which is still available on Chrome Web Store....
Pentester always uses various tools to gather information of the target. And it is most crucial part before creating any further scenarios....
A hacking group, suspected to be from North Korea, uses a Google Chrome extension to target victims in the academic sector. ZDNet...
Many of you may not know that Google Chrome has its own cleanup tool for finding and removing malware. The tool is...
ZIP File Raider is a Burp Suite extension for attacking web application with ZIP file upload functionality. You can easily inject Burp...
The internet is the major source of news for many of us, and we spend a lot of time reading articles to...
Google is the most popular browser around and supports a vast number of extensions as well. Since there are a lot of...
PA Toolkit is a collection of traffic analysis plugins to extend the functionality of Wireshark from a micro-analysis tool and protocol dissector...
A new version of GandCrab Ransomware released, as like the previous version it was not distributed through exploit kits. The distribution method...
Newly spreading PyLocky Ransomware widely targeting and attack various organization by evading the security solutions using its sophisticated attack functionality and its...
If you use this extension for the Chrome browser, it is recommended to uninstall it immediately Ethical hacking experts report that the...
Cloud storage solution MEGA delivered Monero cryptocurrency malware. 21st-century technologies like blockchain are regarded as groundbreaking inventions. However, the security aspect of the...
Malware authors find easy to develop malware using the Microsoft .Net framework, some infamous ransomware like SamSam, Lime and now Shrug2 ransomware...
In May this year, HackRead reported how an Israeli company Unimania was caught collecting personal, Facebook and browsing data of users through Android...
The uploaded spoof version of Chrome Web Store targeted users of MyEtherWallet, the popular encrypted online wallet service. The Google Chrome extension...