Security vulnerabilities are inevitable but one can avoid them by securing applications. In this article, we are listing 5 popular WordPress security...
Along with a patch for a zero-day bug in the Chrome browser, Google has addressed seven other flaws in its recent update....
Experts from multiple digital forensics firms report that the Kazakhstan government has begun intercepting all HTTPS traffic detected within its territory. Internet...
Netflix took the video streaming industry by storm when it debuted Black Mirror: Bandersnatch last year. The “choose your own adventure” themed...
The purpose of security apps is to protect devices and user data. However, Xiaomi’s pre-installed security app did just the opposite and...
Google Chrome’s Data Saver feature helps load pages faster when there is low network connectivity on Android devices. In addition to this,...
testssl.sh is a free command line tool which checks a server’s service on any port for the support of TLS/SSL ciphers, protocols...
Just a simple (poorly written) Python script that aimlessly “browses” the internet by starting at pre-defined rootURLs and randomly “clicking” links on...
Google’s Chrome Browser is now labeling all non-https website as explicitly “not secure.” With the release of Chrome 68 yesterday, all http...
Google is taking the privacy quite seriously, and the new Chrome security update will undoubtedly put a significant toll on all your...
As we hit the browser day in and day out we have seen how the web security has taken to new heights....
Google in 2016 won the desktop browser war, toppling the erstwhile king Microsoft’s Internet Explorer and as of this writing, its minimalist...
Android P will prevent apps from using unencrypted connections by default while establishing connections over the internet, according to a blog post...
In the coming July 2018, Chrome will come down heavily on websites that have not implemented Secure-socket Layer/Transport Security, which will be...
DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim’s machine, a controler, running on any machine,...
Essentially it’s a WiFi hotspot that is continually collecting all the packets transmitted across it. All connected clients’ HTTPS communications are subjected...
CrunchRAT currently supports the following features: File upload File download Command execution It is currently single-threaded (only one task at a time),...
Passive web scanner. EllaScanner is a simple passive web scanner. Using this tool you can simply check your site’s security state. Usage:...
People regularly anticipate that in case you’re strolling OSX, you’re highly secure from malware. But that is turning into much less and...
Short Bytes: Pornhub, a talked about name in the adult entertainment industry has rolled HTTPS encryption across the whole website. This is...
BinProxy is a proxy tool for arbitrary TCP connections. It gives you a TCP proxy and an interface to write protocol-specific parsers...