Security news

Find out what’s happening in the Cybersec, Privacy, InfoSec space and exclusive hacking news as it breaks on the Internet.

Poisoned BitTorrent Client Update Hijacked Over 400,000 PCs Last Week

Over 400,000 PCs Affected By Backdoored Russian BitTorrent Client Nearly over 400,000 computers were infected with cryptocurrency mining malware during a 12-hour period that was caused...
Google Chrome for Android saves user history in Incognito mode

Google Chrome for Android saves user history in Incognito mode

Incognito Mode in Chrome for Android Saves Users Browsing History Chrome, Google's web browser is said to have problems in incognito mode in its Android...
Google Will Pay You $1000 Bounty For Finding Bugs In Android Apps

Google Will Pay You $1000 Bounty For Finding Bugs In Android Apps

You can earn $1000 in Bounty for finding software bugs in Android Apps Google has launched (and is expanding) a new program with the aim...
Security cameras can be hacked using infrared light, claims study

Security cameras can be hacked using infrared light, claims study

Researchers hack security camera networks with IR LEDs Cybersecurity experts from Ben-Gurion University of the Negev (BGU) in Israel have demonstrated that security cameras infected...
programmer

A programmer automates his job for six years forgets coding, gets caught and fired

Programmer Automates His Job For 6 Years, Finally Gets Fired, In The Meantime Forgets How To Code We all know that there is no such...

Buckhacker : search engine to find servers that can be hacked

BuckHacker: A search tool that allows you to search leaky Amazon Web Services servers The lives of hackers has just been made a lot easier,...
Mainstream Torrent sites block YIFY/YTS impersonators sites like YTS.ag

Mainstream Torrent sites block YIFY/YTS impersonators sites like YTS.ag

Major torrent websites warn torrent lovers that YTS.ag is impersonating YIFY/YTS Ever since the demise of popular YIFY/YTS scores of YTS impersonator websites have come...
Top 10 vulnerability scanners for hackers and researchers

Top 10 vulnerability scanners for hackers and researchers

Top 10 vulnerability scanners for hackers to find flaws, holes and bugs Hacking is an art of finding bugs and flaws in a perfect software...
How Hackers Manage To Bypass Google’s Two-Factor Authentication

Here Is How Hackers Bypass Google’s Two-Factor Authentication

Hackers Bypass Google's Two-Factor Authentication By Taking Social Engineering To A New level You may have read reports of Gmail accounts being hacked despite the...
This Hack Tool Can Trace Call, Texts, Location Of Every Single Mobile Phone

This Hack Tool Uses SS7 Flaw to Trace Call, Location Of Every Single Mobile...

This tool uses SS7 Flaw to let you spy on mobile phone calls, messages, and user location The latest news only confirms the theory that...

RECENT