Millions of dollars stolen in scam by taxi drivers in Toronto, Police arrests six

Since 2018, the Greater Toronto Area is facing a major taxi fare scam that involves drivers defrauding customers. The criminal drivers rely on...
Germany Politicians Hack

Hackers Leak Personal Data from Hundreds of German Politicians On Twitter

Germany has been hit with the biggest hack in its history. A group of unknown hackers has leaked highly...

Netwalk Ransomware Hit Pakistani Electricity Provider

Pakistan's K-Electric private force utility, hit by Netwalker ransomware that prompted the interruption of charging and online master administrations. K-Electric is the sole power supplier...

Bltooth Vulnerability Threatens

Allegedly, the Bluetooth Special Interest Group (SIG) and CERT Coordination Center at the Carnegie Mellon University (CERT/CC) have distributed security alarms with respect to...

Adobe : Open Source Tool For Exposed Credentials

Adobe tool named Dubbed Stringlifier is available as open source ,The Tool was written in Python and leverages machine learning to differentiate random character...
samsung M51

Galaxy M51 launched In India with 7,000mAh battery

Galaxy M51 Launched: Samsung has launched its new Galaxy M51 smartphone in India. The company has made big claims about the battery backup of...

India banned 118 Chinese apps along with online game PUBG

Today, the Indian central government has made another digital strike on China. The Indian government has banned 118 Chinese apps today, including the world-famous...

John The Ripper: Password Cracker

John the ripper is the password cracking tool, which is used to test password strength, brute-force encrypted (hashed) passwords, and crack passwords via dictionary...

Database Hacking : Sql Injection

SQL injection is a very common technique for hacking web applications, SQL injection can easily destroy the database of the website. SQL injection is the...
ransomware

Why not hack a hacker?

Tobias Fromel, A Germany-based programmer whose files were encrypted through Muhstik ransomware. Well, the hacker who hacked the hacker, I know pretty confusing. He...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts