Flaw in Linux Kernel Disclosed at Pwn2Own Patched

The Linux kernel vulnerability found at the Zero Day Initiative’s

Fake WordPress SEO Plugin Provides Backdoor Access to Attackers

Researchers have found a fake WordPress plugin which is targeting

iSkysoft Toolbox For Android Review — Recover Android Device Data And Remove Screen Lock

Short Bytes: iSkysoft Toolbox for Android is a great piece

Orange Pi 2G-IoT — A Cheap Linux Computer With Cellular Modem Is Now Available

Short Bytes: The open spec Orange Pi 2G-IoT single board

Indian Bank Loses Rs 25Cr Due To A Bug In UPI Payments App – Is BHIM Safe?

Short Bytes: It has been reported that the India-based Bank

Listen Samsung, Galaxy S8 Face Recognition Can Be Fooled With A Photo

Putting an end to all the leaks and rumors, Samsung

CVE-2017-2636: exploit the race condition in the n_hdlc Linux kernel driver bypassing SMEP

This driver provides HDLC serial line discipline and comes as

Raging Sysadmin Shuts Down Company Servers, Deletes System Files

A former sysadmin is facing up to ten years in

How To Open Any Windows App Using Keyboard Shortcuts?

Short Bytes: If you use some Windows apps more frequent

World’s Biggest Porn Site Is Now HTTPS Protected And Fully Encrypted

Short Bytes: Pornhub, a talked about name in the adult

90% Of Smart TVs Are Easily Hackable Via Malicious TV Signals

Short Bytes: Do you know that your televisions can be

NXcrypt – python backdoors payloads crypter

NXcrypt – python backdoors payloads crypter  NXcrypt is a python

Malware-Checker – Check running programs for virustotal.com malware detections

Malware-Checker –  Check running programs for virustotal.com malware detections  I

cookiemonster – Utility for grabbing cookies from browsers

cookiemonster –  Utility for grabbing cookies from browsers   requirements

Flatbed Scanners Used as Relay Point for Controlling Malware in Air-Gapped Systems

Scientists from two Israeli universities have come up with a

How To Remotely Access Your Computer Using Chrome Remote Desktop

Short Bytes: Using Chrome Remote Desktop, which is a Chrome

Blizzard’s World of Warcraft fans hit by phishing scam

Hackers have centered their attention towards a famous game “World

Fappening 2.0: Everything You Need To Know And How To Stay Safe

Short Bytes: It looks like the much talked about Fappening

Manalyze – A static analyzer for PE executables

Manalyze –  A static analyzer for PE executables   Introduction

India’s First-Ever 1Gbps Fiber Broadband Connection Launched By ACT Fibernet

Short Bytes: India’s first 1Gbps commercial broadband service has been

Bypass Windows Login Password using Android Phone with DriveDroid

Drive Droid is an Android application that allows you to

IXmaps: This Map Tells If Your Web Traffic Is Being Spied On By The NSA

Short Bytes: IXmaps is an online interactive map that can

How To Re-Enable “Backspace” Button To Go Back In Google Chrome?

Short Bytes: The Google Chrome web browser doesn’t allow its

New Mirai variant launched a 54 hour DDoS attack on a US college

Last August, a Malware called Mirai was discovered. Now, it appears

Microsoft Launches Ruuh — A New AI Chatbot For India

Short Bytes: Microsoft has released another AI chatbot. Named Ruuh,

Kremlin-backed APT28 doesn’t even bother hiding its attacks, says Finnish secret police

Supo: Espionage rising, attacks on infrastructure falling. The Finnish Security

Google Wants to Change JavaScript Popups After Abuse from Tech Support Scammers

Chromium engineers are discussing plans to change how JavaScript popups

Cisco Is Developing Its Own Networking Operating System Named “Lindt”

Short Bytes: Networking giant Cisco is reportedly making its own

pastebin-scraper – A simple scraper that identifies passwords in public posts on pastebin.com

pastebin-scraper – A simple scraper that identifies passwords in public

DHCPig – DHCP exhaustion script written in python using scapy network library

DHCPig –  DHCP exhaustion script written in python using scapy