Reverse Engineering Pokemon GO APK File

Reverse Engineering Pokemon Go App

Reverse Engineering the app The code is not obfuscated, which makes attempts at reverse engineering much easier. We are able to rebuild a functional project Dependencies could be better managed No...
How Do Hackers Easily Crack Your Strongest Passwords

How Do Hackers Easily Crack Your Strongest Passwords

Password storage and its encryption is a common question that’s often discussed in the cyber security world. At many occasions, when people mention encrypted passwords, they really mean hashed passwords. Unlike...
Creating a Malware Ransomware Defendable Network

Creating a Malware/Ransomware Defendable Network

The risk of sophisticated malware, especially of ransomware, has grown exponentially over the years. This means we need to evolve our techniques for mitigation, detection and monitoring of malicious behavior on...
Top 5 Most Beautiful Female Hackers in the world

Top 5 Most Beautiful Female Hackers in the world

Adeanna Cook She is a former Playboy model nobody wants to mess with. Many friends of her tried to post her naked photos on the internet and also decided to take money...
Anatomy of a Ransomware Attack

Anatomy of a Ransomware Attack

By now, we have realized how lucrative the ransomware business has become for criminals. This is due in part to the success of common ransomware such as Locky or Cryptolocker. It...
80,000 Amazon Users Password Leaked

80,000 Amazon User’s Password Leaked

Amazon Kindle Servers Breached, 80,000 Amazon Users’ Passwords and Personal Information Leaked A hacker going under the alias of ‘0x2Taylor’ claims to have breached an Amazon server, which comprises of more than...
Exploit Remote Server using Tiki-Wiki CMS Calendar Command Execution

Exploit Remote Server using Tiki-Wiki Calendar Command Execution

Tiki-Wiki CMS’s calendar module contains a remote code execution vulnerability within the viewmode GET parameter. The calendar module is NOT enabled by default. If enabled, the default permissions are set to...
Wildpwn Unix Wildcard Attack Tool

Wildpwn – Unix Wildcard Attack Tool

Wildpwn is a Python UNIX wildcard attack tool that helps you generate attacks, based on a paper by Leon Juranic. It’s considered a fairly old-skool attack vector, but it still works...
Hacking mobile via hidden voice commands embedded in YouTube videos

Hacking mobile via hidden voice commands embedded in YouTube videos

A group of researchers has devised a new method for hacking mobile devices by using hidden voice commands in YouTube videos. A group of researchers from the University of California, Berkeley, and...
Downloading Pokémon GO Game for Android

Downloading Pokémon GO Game for Android ? Beware !

"Pokémon Go" has become the hottest iPhone and Android game to hit the market in forever with enormous popularity and massive social impact. The app has taken the world by storm...
How To Install Kali Linux On Android Smartphone

How To Install Kali Linux On Android Smartphone

Install Kali Linux on your Android device and develop a portable penetration testing environment Kali Linux, a secure distribution of Linux, is one of the most widely used OS among ethical hackers...
How to find out if your Facebook account has been hacked

How to find out if your Facebook account has been hacked

This is what you need to do if your Facebook account is hacked There is always a chance someone can obtain your password and log into your online account. And, Facebook is...

HOT NEWS

RANDOM ARTICLES

LATEST ARTICLES