This Skype vulnerability allows you to bypass Android’s phone lock
A security researcher found a vulnerability in Skype’s Android app which allows users to access several app functions without entering the passcode...
The Fascinating Hacker Tools of Mr. Robot
Hacking, for the most part in popular culture, has always been misrepresented. The producers of these media focus more on getting the typical "oh...
Emotet Banking Trojan is back again
Emotet, the infamous banking trojan has emerged again in the radar after a dip in its activity.
The latest version of Emotet can...
PYSA : Security Tool As Open Source
Facebook releases a tool named PYSA, as an open-source tool, after the success of tool on Instagram.
PYSA :
It is used to detect the bugs...
Adobe : Open Source Tool For Exposed Credentials
Adobe tool named Dubbed Stringlifier is available as open source ,The Tool was written in Python and leverages machine learning to differentiate random character...
AI composes an Eurovision song
A song by the name "Blue Jeans and Bloody Tears" has been algorithmically generated by a deep learning cloud-based AI which was fed thousands...
Pentagon Impedes 36 Million Malicious Emails Each Day
The Defense Information Systems Agency conducts an assessment of DoD web browsing practices to determine the utility of bandwidths.
The US navy spends around $160...
Best Driver Updater Tools 2020:
Driver updater tools do exactly what you're probably thinking—they assist you update some or all of the device drivers installed in Windows for your...
Smart Bulbs: Next big target for cyberattacks?
Researchers at UTSA have recently discovered that invisible wave spectrum in smart bulbs which come equipped with infrared abilities can be taken advantage of...
Apple App Store: What’s next?
While the Google Play Store is no stranger to malware-infected apps, the App store seems to be experiencing its first slice of it. Recently,...