You are not alone, WhatsApp is down for many

If you are wondering why your WhatsApp is down, don’t

DOS Attack with Packet Crafting using Colasoft

In our previous article we had discuss “packet crafting using

Dreambot Banking Trojan Delivered via Resume-Themed Email

Dreambot banking Trojan which is a variant of Ursnif spreading

Nintendo Switch Hacked to Run Pirated Games

There is no doubt about the fact that Nintendo Switch

Packet Crafting with Colasoft Packet Builder

In this tutorial we are going to discuss Packet Crafting

Snowden Explains Why Telegram Messenger App is Unsafe

For years, the ex-NSA (National Security Agency) whistleblower Edward Snowden

Liverpool Mexico website hijacks visitor computers/mobiles to mine cryptocurrency

  As the values of the largest cryptocurrencies have multiplied, so

250+ Mobiles Games Are Using Your Smartphone Mic To Track What You’re Watching

The year 2017 witnessed the rise in the popularity of

PS4 Jailbreak possible with newly identified exploit

PS4 Jailbreak is now possible – Thanks to a new

Risk with Steganography and Importance of running Steganalysis with Network Systems

Steganography is an art of hiding messages covert way so

Victim of Swatting: Police kills Innocent man after Call of Duty gamer prank call

An innocent man was shot dead by a police officer after

ATMs running on Windows XP in Russia hacked by pressing ‘Shift’ key 5 times

Security vulnerability found in ATM machines running Windows XP in

Chrome Extension With 100,000 Users Caught Cryptojacking Using Your CPU Power

The trend of mining cryptocurrency hasn’t gone unnoticed by the

OSPF (Open Shortest Path First) Routing Protocol & Its Stages

OSPF (Open Shortest Path First) is a link state routing Protocol,

Chrome Extension with 105,000 installs is a Cryptocurrency Miner

“Archive Poster” extension for Chrome browser is being currently used by 105,000

DHCP Penetration Testing

DHCP stands for Dynamic Host Configuration Protocol and a DHCP server

TCP Bind Shell in Assembly (ARM 32-bit)

In this tutorial, you will learn how to write TCP

Bitcoin exchange hit by DDoS attack after kidnapping of its official (Updated)

Bitcoin is one of those cryptocurrencies whose value has rapidly

Orange Pi One Plus Single Board Computer With Android Is Here, Linux Images Are Coming

Whenever we discuss single board computer and Raspberry Pi-alternatives, Orange

Apple Apologizes For Slowing Down iPhones, Offers Solutions And Cuts Battery Prices

Earlier this month, Apple became a target of media websites

How Memory Leaks Happen in a Java Application

Introduction to Memory Leaks In Java Apps One of the

EA servers down; Battlefield 1, Battlefront 2, Star Wars & FIFA 18 Affected

You are not alone, (Electronic Arts) EA servers are down

Sound Waves can Help Hackers Disrupt Functions of Hard Disk Drives

Hard Disk Drives (HDDs) are most commonly used storage components

Bose & Sonos Smart Speakers can be Hacked to Play Disturbing Sounds

Another day, another IoT flaw – Sonos and Bose Smart

Developer Gets ‘Transparent Face’ Using iPhone X Face ID

The uses of Face ID is a lot more than fooling

John McAfee’ Twitter account hack: “Most likely my phone was compromised”

The official Twitter account of security guru John McAfee was apparently

Russia Might Be Hacking FBI And Stealing Fingerprints Of Millions, Says Report

If a mere speculation is to be believed, the biometric

Game Of Thrones Season 8 Script Reportedly Leaked By Reddit User

The whole Game of Thrones Season 7 was affected by

10 Free And Best Android Camera Apps For 2018

We are living in a generation where instead of carrying

HACKERS CAN RICKROLL THOUSANDS OF SONOS AND BOSE SPEAKERS OVER THE INTERNET

PERHAPS YOU’VE BEEN hearing strange sounds in your home—ghostly creaks and