The Blue Screen of Death (BSoD)
In various computer Operating Systems a special type of error message is displayed on the screen when the system faces a fatal error. Most computer users have termed these messages as Screens of Death as … Read more
In various computer Operating Systems a special type of error message is displayed on the screen when the system faces a fatal error. Most computer users have termed these messages as Screens of Death as … Read more
As you browse on the internet, you have a public IP address. This Internet Protocol address is shared with all the apps you use, websites you visit or services you use. Meanwhile, you can decide … Read more
Banks are quickly taking on AI technology to improve the various divisions in their fold. With this implementation, research suggests that the industry could save as much as $1 trillion in efficiencies by 2030. While this might … Read more
So far in 2018, there have been more than 300,000 cybersecurity job openings in the US, as reported by CyberSeek. This is predicted, by the Bureau of Labor Statistics, to rise by 28% before the … Read more
A USB based dongle can go long way in terms of screwing you, your data, and even your life. Every other day we come across a new device that exposes a new type of vulnerability, … Read more
Its time for revelation of various hacks from your home security system to cars which rely on wireless key locks, as the BlackHat 2014 conference kicks-off. At this year’s BlackHat conference, various hacks in security … Read more
When we don’t find it on Google, we declare it doesn’t exist. But as per Founder Shodan, that statement is not essentially true. He believes that when something is not searchable on Google, that’s when … Read more
Ever year hackers research and reverse engineer mainstream electronics and commercial products in the market. At 29C3, security researchers from Columbia university demoed what they call to have achieved Hacking Cisco VOIP phone to remotely … Read more
Desktop IMs have long been our favorite mode of communication. But with time, their significance has definitely come down. Smartphones taking large part of our daily life, IM services like Whatsapp, iMessage, BBM, etc have … Read more
Once in a while a new exploit or vulnerability arises that affects every single PC on the internet and within a span of few hours, it spreads across the globe. Such exploits are often called … Read more
How often it is the case that a new Exploit is discovered that renders most of the PCs vulnerable to attacks? Well, thats like everyday. But most of such exploits never go mainstream or is … Read more
Drones, the unmanned aerial flying vehicles, have become a major part of modern warfare. Researchers at the University of Texas’ Lab have successfully demonstrated that a drone with an unencrypted GPS system can be taken over by … Read more
If you are geek enough to pentest every wireless network you connect, we got an app for you. dSploit is an Android based network analysis & penetration suite. It is a comprehensive toolchain which can … Read more
This could be one of the biggest disasters for a company. Hackers stole the source code of Symantec’s pcAnywhere back in 2006 and have now claimed to release it to public. In the meantime hackers … Read more
Network Spoofer lets you run arpspoof attacks and other fun hacks from Android, messing with your Wifi internet from your phone, just like WifiKill can kick users from Wifi. Note: This app is just for … Read more