Card-Not-Present fraud is still a problem, however. The US began its transition to chip-based credit cards in earnest in October 2015, after...
Microsoft word documents abused by Cryptocurrency Mining script embedded phishing Videos and victims tricked into watching an “innocent” video that leads to performing a...
Although I have a special place in my heart for this mobile operating system, I won’t say I am aware of every hidden...
Norwegian browser maker Opera has launched the beta version of Opera 50, the first popular browser to integrate a built-in cryptocurrency-mining blocker....
Google Chrome comes as a default browser installed on most Android phones. It is fast, responsive and comes with all the basic...
Written by Amit Serper, @0xAmit DDEtector is a simple DDE object detector written in python Currently supports only word DOCX and legacy...
It is very usual these days to find many applications having a hidden crypto-mining module. But the recent trend is more mainstream...
The Firefox sandboxing innovation confines the browser from the operating system in a way to block web attacks from using a vulnerability...
Even the creator of MINIX operating system didn’t know that his for-education operating system is on almost every Intel-powered computer. He is okay...
A recently discovered MS Word DDE Exploit, uncorrected attack method that exploits an integrated feature of Microsoft Office is currently used in several...
Google Aims to Put an End to Secret Cryptojacking by Making In-Browser Permissions Necessary. In-browser cryptocurrency mining has become the latest obsession...
I’ve seen Twitter traffic today about malspam from the Necurs Botnet pushing Locky ransomware using Word documents as their attachments. These Word...
A newly discovered unpatched attacking method that exploits a built-in feature of Microsoft Office is currently being used in various widespread malware...
SMS Privacy is available as a Tor hidden service, and it turns out ~10% of users actually use it that way. This post...
On September 17, 2017, iOS 11 mobile operating system was released by Apple. The biggest features of iOS 11 included ARKit, improved camera,...
Europe’s leading cyber-security firm Positive Technologies’ security researchers have a bad news for Intel users. They have detected a secret configuration setting...
The biggest tech companies have their rigorous recruitment process to assess the candidates and find if they are suitable for their companies....
Short Bytes: The name VLC needs no introduction. Although most people perceive it only as a simple media player but hidden beneath...
Short Bytes: If you love clicking pictures and sharing them with your friends and family, by using some handy Instagram tricks you...
Short Bytes: Apart from your main News Feed, Facebook offers an option to access a second and hidden feed in its Android...
Creating a website is pretty simple. Creating a hidden service via Tor isn’t much different. In fact, if you have any semblance...