WannaCry for Spamming and Phishing
Hackers are using social engineering techniques leveraging fear of wannacry in peoples mind to send spam mails and perform phishing attacks to harvest user credentials.
Hackers are using social engineering techniques leveraging fear of wannacry in peoples mind to send spam mails and perform phishing attacks to harvest user credentials.
Vault 7 is a series of documents and tools released by WikiLeaks, that gives information about detailed activities and capabilities of the US CIA to perform spying and cyber warfare. Today, 31 August 2017, Wikileaks revealed another tool dubbed AngelFire that attacks windows machine to gain persistent access remotely.
A new vulnerability allows hackers to hack into Abbott’s pacemakers using RF waves and fully take control over the running device.
A few months back Kali Linux 2017.1 rolling was released and the popular distro came up with a set of significant updates and features which include Support for RTL8812AU Wireless Card Injection, Support for CUDA GPU Cracking, Amazon AWS and Microsoft Azure Availability and much more. But after a survey, we found that there are…
In the last few weeks their was constant DDOS attack against multiple Content Delivery Networks (CDNs) and content providers by a botnet named ‘WireX’. There was a cross-industry collaborated effort between various CDNs and technology industries has led to successful dismantling of WireX Botnet.
Apple has launched its latest version of iOS that is iOS 11 Beta 8 which is making quite a few performance as well as design changes.
After stealing several episodes of world famous television series “Game of Thrones”, hackers are now using Game of Thrones as lure for another attack on targeted users exploiting the curiosity of GOT fans. Recently a new technique was spotted spreading multi architecture malware via E Mail attempting a spear phishing attack targeting windows machines using…
Asus has come up with a new hardware which is specifically designed for mining crypto-currency. This motherboard offers offers 19 PCIe slots and Triple Power Connections and can connect 19 GPUs.
In order to become a good hacker, one must have basic knowledge of things he is doing and a right set of tools and software. Here is a list of most popular hacking tools of 2018 that are used with kali linux 2018, for Web Application and Website hacking.
After the world wide attack of WannaCry ransomware, hackers are putting a lot of effort into developing higher levels of ransomware. A new wave of ransomware attack has begun targeting Healthcare and Educational Organizations spreading via E-Mails with carefully designed social engineering methods.