Web Analytics

Leaked NSA hacking tools used to attack Cisco devices

Leaked NSA hacking tools used to attack Cisco devices

Some unknown hackers have made use of the NSA hacking tools that were released a few months ago to hack into some targets using firewalls and switches and some routers which the tech company Cisco make. The news was revealed by Cisco itself. The attack indicates the first real-time attack that has been made using … Read more

New vulnerabilities in Signal app can be used to alter attachments

New vulnerabilities in Signal app can be used to alter attachments

Security researchers have discovered a flaw in the Android version of the secure messaging application, Signal, which lets hackers make the app crash and also alter the attachments sent on the app. Signal is one of the most revered secure messaging applications, and it was built by Moxie MarlinSpike’s Open Whisper System. It’s a privacy-focused … Read more

Malware Author Claims It Is Not Harmful

Malware Author Claims It Is Not Harmful

MalwareMustDie, a security researcher came across a new Linux Trojan two weeks again, which he claims is the first Linux malware to be coded in the Lua language. After reverse engineering the code, there was proof that the Trojan was believed to be only targeting the IoT infrastructure and also had some features which could … Read more

Pokemon Go related apps affected with malware

Pokemon Go; The Dream of Gamers and Hackers

Pokemon Go came and it changed the way people viewed games again. When it came back in July the game was a sensation. Its worldwide success however meant that it also caught the attention of hackers who wanted to also enter into the success. The game was launched back in July, and then it was … Read more

New USB Killer device available on the market for only $56

New USB Killer device available on the market for only $56

A new device called the USB Killer is available on the market and it is deadly as the name suggests. The drive can completely annihilate anything that it is connected to, regardless of whether it’s a TV, computer or anything with a USB port this day. The USB hard drive works by getting power from … Read more

Marvel SuperHero names used to attack OPM

Marvel SuperHero names used to attack OPM

A data breach that was discovered by the US governed agency last year was being investigated over the past few years, and the results are stunning. It was revealed that the hack was actually initiated by the agency itself through some endless number of mistakes. The report was done by the comprehensive congressional report, and … Read more

Yelp launches bug bounty program with high rewards of $15,000

Yelp launches bug bounty program with high rewards of $15,000

Yelp, the popular customer review site, launched its own bug bounty program on September 6 and announced that white hackers and security researchers were free to walk around on its security systems and find any flaws and potential bugs that would put the service down. Yelp announced during the launch that they would be pleased … Read more