13 Infected Android Apps on Google Play Phishing Instagram Accounts

Lately, credential stealing campaigns and Instagram go hand in hand

Payload mask – tool to edit web payload lists to try bypass web application firewall

Payload mask – tool to edit web payload lists to

plown – Security scanner tool for Plone CMS

plown –  Security scanner tool for Plone CMS  Plown is

OWASP ByWaf-RE – framework platform to create store and execute python tools for Web application penetration testing

OWASP ByWaf-RE – framework platform to create store and execute

Here Is An iPhone Case That Is Also An Android Phone

Short Bytes: Eye is a new case for Apple iPhone

lfi-image-helper – simple script to infect images with PHP Backdoors for local file inclusion attacks

lfi-image-helper – simple script to infect images with PHP Backdoors

These Robots And Their Makers Are Being Sued For “Killing” A Technician

Short Bytes: William Holbrook, the husband of a technician Wanda Holbrook, has filed

Hackers Use $5 Speakers To Control Smartphone And Fitbit Using Sound Waves

Short Bytes: According to a new research by a team

WS-Attacker – modular framework for web services penetration testing

WS-Attacker – modular framework for web services penetration testing  WS-Attacker

How To Send And Request Money Using Your Gmail App For Android

Short Bytes: Google has integrated Google Wallet into its Gmail

​New smartphone threat: Now attackers can use sound to hack your device

Don’t assume you can trust the hardware sensors in your

Turkish Hackers Deface Hundreds of Websites and Twitter Accounts

The Turkish-Dutch political conflict has spewed into cyberspace during the

U.S. to Charge 4 Hackers Involved in Massive Yahoo Data Breach

The U.S. Department of Justice is gearing up to issue indictment

Say Goodbye To Windows Vista And Ubuntu 12.04, Support Ends In April 2017

Short Bytes: It’s time for Microsoft’s Windows Vista and Canonical’s

Linux Mint Debian Edition (LMDE 2 Betsy) Gets Updated ISO Images, Download Now

Short Bytes: LMDE 2 Betsy is a less popular version

domi-owned – IBM Lotus Domino exploitation

domi-owned –  IBM Lotus Domino exploitation Domi-Owned is a tool

inquisitor – OSINT Gathering Tool for Companies and Organizations

inquisitor –  OSINT Gathering Tool for Companies and Organizations Inquisitor

Google Kicks Chamois Android Adware off the Play Store

Following an internal audit, Google engineers say they’d discovered a

PetrWrap: the new Petya-based ransomware used in targeted attacks

Previously unknown ransomware technique. This year we found a new

Crooks hijack Magento Realex Payments extension to steal payment card data

Cybercriminals hijack Magento Realex Payments extension to steal payment card

WWW Inventor Tells 3 Biggest Threats For The Web, Says We Must Make Changes

Short Bytes: According to the inventor of the web, spreading

Anonymous Brazil Hacks Football Club for Hiring Goalkeeper Convicted of Murder

The online hacktivist Anonymous along with its counterparts in Brazil