How To Remotely Access Your Computer Using Chrome Remote Desktop

Short Bytes: Using Chrome Remote Desktop, which is a Chrome

Blizzard’s World of Warcraft fans hit by phishing scam

Hackers have centered their attention towards a famous game “World

Fappening 2.0: Everything You Need To Know And How To Stay Safe

Short Bytes: It looks like the much talked about Fappening

Manalyze – A static analyzer for PE executables

Manalyze –  A static analyzer for PE executables   Introduction

India’s First-Ever 1Gbps Fiber Broadband Connection Launched By ACT Fibernet

Short Bytes: India’s first 1Gbps commercial broadband service has been

Bypass Windows Login Password using Android Phone with DriveDroid

Drive Droid is an Android application that allows you to

IXmaps: This Map Tells If Your Web Traffic Is Being Spied On By The NSA

Short Bytes: IXmaps is an online interactive map that can

How To Re-Enable “Backspace” Button To Go Back In Google Chrome?

Short Bytes: The Google Chrome web browser doesn’t allow its

New Mirai variant launched a 54 hour DDoS attack on a US college

Last August, a Malware called Mirai was discovered. Now, it appears

Microsoft Launches Ruuh — A New AI Chatbot For India

Short Bytes: Microsoft has released another AI chatbot. Named Ruuh,

Kremlin-backed APT28 doesn’t even bother hiding its attacks, says Finnish secret police

Supo: Espionage rising, attacks on infrastructure falling. The Finnish Security

Google Wants to Change JavaScript Popups After Abuse from Tech Support Scammers

Chromium engineers are discussing plans to change how JavaScript popups

Cisco Is Developing Its Own Networking Operating System Named “Lindt”

Short Bytes: Networking giant Cisco is reportedly making its own

pastebin-scraper – A simple scraper that identifies passwords in public posts on pastebin.com

pastebin-scraper – A simple scraper that identifies passwords in public

DHCPig – DHCP exhaustion script written in python using scapy network library

DHCPig –  DHCP exhaustion script written in python using scapy

crackfile – Encrypt binary Decrypt binary

crackfile –  Encrypt binary  Decrypt binary   Crackfile —–> Has

seth – Perform a MitM attack and extract clear text credentials from RDP connections

seth – Perform a MitM attack and extract clear text

Around 8 million websites affected by a critical Buffer Overflow Vulnerability resides in IIS 6.0

Internet Information Services is an extensible web server made by

About 90% of Smart TVs Vulnerable to Remote Hacking via Rogue TV Signals

A new attack on smart TVs allows a malicious actor

c Cops Arrest Man Potentially Linked to Apple Extortion

The man is suspected of blackmail and hacking offenses. On