Browsing Category
Security
483 posts
iPhones Are Vulnerable For Years – Google
Cyber Criminals can exploit Your iPhone through Zero Day Vulnerability. According to latest security research, the bug allowed…
August 30, 2019
How Can Information Leakage Happen in Organisation?
Conduct Search Engine Discovery and Reconnaissance for Information Leakage is in testing checklist for information gathering while doing analysis.…
August 30, 2019
iPhone Contacts App Vulnerable To SQLite Hack
If you are using an iPhone and thinking that it is the most secured device, then you are…
August 13, 2019
Earn $1 Million- Apple Bug Bounty Offer
Earn $1 Million From Apple Bug Bounty Great News for Bug Bounty Hunters Apple increases its Bug bounty…
August 10, 2019
Google Expands – Advanced Protection Program For Chrome
Google is always working to improve their security. Now it increase with Advance Protection Program (APP). Google Unveiled…
August 8, 2019
Using VPN Services in Denmark
Local Danish residents or people traveling to this country may benefit from secure and steady Virtual Private Network…
August 5, 2019
New Android Ransomware Spreading Through SMS
A new Android Ransomware found to infect the mobile users. It is found by ESET Mobile security researchers, and…
July 30, 2019
VLC Not Vulnerable, Mitre Not Checked And Contacted- VideoLan
VideoLane claims that they have fixed critical vulnerability in VLC Media Player. The company said VLC is not…
July 25, 2019
A Brief Guide- How To Prevent Ransomware
Preventing ransomware is not at all difficult, it really boils down to practicing safe security habits. This means…
July 23, 2019
Russian Intelligence Agency Secret Docs Hacked
Russian Secret Intelligence Agency Hacked! Hackers expose secret docs of Federal Security Service (FSB) Hackers Stole 7.5 TB…
July 22, 2019