October 4, 2018

    Google Chrome new Update To Malicious Chrome Extensions

    Chrome new Update To Malicious Chrome Extensions: Google has made another new announcement for Chrome Web Store for aims at…
    August 5, 2018

    200,000 MikroTik Routers hacked and Turned Into Crypto-Mining Zombies

    MikroTik Routers hacked 200,000 MikroTik Routers hacked and Turned Into Crypto-Mining Zombies MikroTik Routers hacked: Independent malware investigator has discovered…
    July 21, 2018

    Microsoft Releases PowerShell Core for Linux

    Microsoft has published its command-line shell and scripting language PowerShell for Linux OS as a Snap package, creating it effortless…
    July 1, 2018

    Security Flaws Uncover in LTE (4G) Mobile Telephony Network Protocol

    Alter Attack : A team of researchers has discovered yesterday that reports three attacks against the 4g network protocol  standard LTE (Long-Term Evolution),…
    June 5, 2018

    Over 115,070 Drupal Sites Still Vulnerable to Drupalgeddon 2

    Over 115,000 Drupal Sites Still Vulnerable to Drupalgeddon 2: In March 2018, the Drupal developers Jasper Mattsson discovered a “highly…
    June 4, 2018

    Top Secret Windows and Kali linux Commands

    A to Z List of Windows CMD Commands Here is an A to Z list of Windows and kali  commands…
    June 3, 2018

    what is penetration testing | 12 best pentesting tools | pentesting methode

                                           …
    May 27, 2018

    Unplug your Alexa devices immediately, You’re being hacked

    Unplug your Alexa devices immediately, You’re being hacked A couple from Portland received a call from a friend “Unplug your Amazon Alexa…