Smart Bulbs: Next big target for cyberattacks?
Researchers at UTSA have recently discovered that invisible wave spectrum in smart bulbs which come equipped with infrared abilities can be taken advantage of...
This Skype vulnerability allows you to bypass Android’s phone lock
A security researcher found a vulnerability in Skype’s Android app which allows users to access several app functions without entering the passcode...
AI composes an Eurovision song
A song by the name "Blue Jeans and Bloody Tears" has been algorithmically generated by a deep learning cloud-based AI which was fed thousands...
Adobe : Open Source Tool For Exposed Credentials
Adobe tool named Dubbed Stringlifier is available as open source ,The Tool was written in Python and leverages machine learning to differentiate random character...
John The Ripper: Password Cracker
John the ripper is the password cracking tool, which is used to test password strength, brute-force encrypted (hashed) passwords, and crack passwords via dictionary...
Deep Web : How To Access it ?
Introduction:
There are many types of web ! but some of the main on which i will focus on my blog are:
1. Surface Web
2. Dark...
Millions of dollars stolen in scam by taxi drivers in Toronto, Police arrests six
Since 2018, the Greater Toronto Area is facing a major taxi fare scam that involves drivers defrauding customers.
The criminal drivers rely on...
Database Hacking : Sql Injection
SQL injection is a very common technique for hacking web applications, SQL injection can easily destroy the database of the website.
SQL injection is the...
Google App Contains Joker Malware : Removed
Security scientists from Pradeo found Joker malware flooding the Play Store mimicking different applications. As uncovered through their post, they discovered six distinctive Android...
The First Ever Youtube Video Has Been Ruined: Here’s Why
The first-ever video that was uploaded to youtube has been ruined because of some hack which has taken place.
The video’s description has been edited...