Blogs
-
Read more
GIF (Graphic Interchange Format) are the the new age mode of portraying feelings and messages over social media platforms.
Yahoo! is an internet portal that incorporates a search engine and a directory of World Wide Web organized in a hierarchy of topic categories.
“Divergent” and “Nodersok” are the names given to payload which utilizes Node.exe which is an implementation of NodeJS by Microsoft.
At the beginning of this month, a critical vulnerability was found in various SIM cards. This vulnerability is capable of remotely compromising targe
Customers from New Zealand reported that on Wednesday, the Vodafone mobile app had a bug which allowed the customers to view details of other custome
Read moreA new phishing scam has recently come up and is targeting Instagram users.
Read moreGoogle Alerts are content to change detection and notification service offered by Google.
Webcams are commonly used for security purposes these days. Almost every mall, shop, home, and office has one. Webcams are used to record and surveil
Even after two years of discovery, WannaCry ransomware was found to dwell in more than 12,000 variants. WannaCry was well known in 2017 after it caus
Read moreGoogle has recently released an update for its Chrome browser.
Its been long since the medical industry has adopted new technologies and started using digital measures rather than the old analog ones. The medical
Read moreTFlower ransomware is the most recently detected ransomware which is targeting the corporate sector.
Emotet botnet went down around the beginning of June this year. However, the command and control server of Emotet has started working again by target
Read moreNemty ransomware now has the ability to kill processes and services of target devices.
Posted: September 14, 2019Views: 8News about a new phishing scam email is circulating through the web. This phishing email tricks users and leads them to a site which looks exactly th
Over the weekend (7 Sept to 9 Sep) Entercom Radio's internal networks were hit with a ransomware attack making it the third US national radio group t
'Joker' is here to turn your mobile phones into his Gotham. A new Android Trojan with malware dropper and spyware capabilities named 'Joker', was fou
Bluekeep is a security vulnerability that was discovered in Microsoft's Remote Desktop Protocol (RDP), which allows remote code execution.
D-Link and Comba networking gears are the most widely used devices throughout the globe. D-Link is one of the trusted brands in India for routers and
Facebook's security issues and breaches continue as reports say that phone numbers of 419 million users have been compromised. The exposed database c
Back to Top