Apple App Store: What’s next?
While the Google Play Store is no stranger to malware-infected apps, the App store seems to be experiencing its first slice of it. Recently,...
The Fascinating Hacker Tools of Mr. Robot
Hacking, for the most part in popular culture, has always been misrepresented. The producers of these media focus more on getting the typical "oh...
Millions of dollars stolen in scam by taxi drivers in Toronto, Police arrests six
Since 2018, the Greater Toronto Area is facing a major taxi fare scam that involves drivers defrauding customers.
The criminal drivers rely on...
The First Ever Youtube Video Has Been Ruined: Here’s Why
The first-ever video that was uploaded to youtube has been ruined because of some hack which has taken place.
The video’s description has been edited...
Adobe : Open Source Tool For Exposed Credentials
Adobe tool named Dubbed Stringlifier is available as open source ,The Tool was written in Python and leverages machine learning to differentiate random character...
Smart Bulbs: Next big target for cyberattacks?
Researchers at UTSA have recently discovered that invisible wave spectrum in smart bulbs which come equipped with infrared abilities can be taken advantage of...
Google Play Store: A hub for spreading malware?
A report by Russian security firm Doctor Web has suggested that several of the Google Play Store's apps were spread malware known as "The...
Metasploit outside LAN
Downloading NGROK and setting up an account
Using it in msfvenom
Starting a listener
Setting up NGROK
Setting up ngrok is fairly simple.
Go to their...
This Skype vulnerability allows you to bypass Android’s phone lock
A security researcher found a vulnerability in Skype’s Android app which allows users to access several app functions without entering the passcode...
Emotet Banking Trojan is back again
Emotet, the infamous banking trojan has emerged again in the radar after a dip in its activity.
The latest version of Emotet can...