PowerPoint Presentation Exploiting CVE-2017-0199

7 years ago

Researchers at FortiGaurd had discrovered a new Power Point Presentation File named "ADVANCED DIPLOMATIC PROTOCOL AND ETIQUETTE SUMMIT.ppsx" spreading via…

WannaCry for Spamming and Phishing

7 years ago

Hackers are using social engineering techniques leveraging fear of wannacry in peoples mind to send spam mails and perform phishing…

AngelFire – CIA Implant For Windows Machines

7 years ago

Vault 7 is a series of documents and tools released by WikiLeaks, that gives information about detailed activities and capabilities…

Critical Pacemaker Vulnerability Revealed – Millions of Lives at Risk

7 years ago

A new vulnerability allows hackers to hack into Abbott's pacemakers using RF waves and fully take control over the running…

Kali Linux 2018.1 – Top 3 Features Hackers Would Like to Have

7 years ago

A few months back Kali Linux 2017.1 rolling was released and the popular distro came up with a set of…

WireX Botnet Taken Down – Android DDOS Botnet Neutralized

7 years ago

In the last few weeks their was constant DDOS attack against multiple Content Delivery Networks (CDNs) and content providers by…

How to Install iOS 11 Beta 8 Release

7 years ago

Apple has launched its latest version of iOS that is iOS 11 Beta 8 which is making quite a few…

Winter is Coming as Malware – New Malware digging Game of Thrones

7 years ago

After stealing several episodes of world famous television series "Game of Thrones", hackers are now using Game of Thrones as…

Cryptocurrency Mining Beast with 19 GPUs from Asus

7 years ago

Asus has come up with a new hardware which is specifically designed for mining crypto-currency. This motherboard offers offers 19…

Top 10 Website Hacking Tools of 2018 in Kali Linux

7 years ago

In order to become a good hacker, one must have basic knowledge of things he is doing and a right…