Home Blog Page 2

New Vulnerability found in Bluetooth Affects major devcies

New Bluetooth Vulnerability found and it's affected on all major vendors Yet another bluetooth hacking technique has been uncovered. A highly critical cryptographic vulnerability has been...

Top 5 browsers for your Android phone.

Tired of your default browser! try these alternatives. A browser is a gateway to access everything on the other side of the internet. A browser...

Hacker’s Exploit outdated router to steal 1 Million Dollars

Hacker's exploit outdated router to rob PIR Bank Hackers stole at least $920,000 from Russia's PIR Bank after they successfully compromised an outdated, unsupported Cisco...

How to hear and delete every conversation you had with google

It's time to delete you're conversation with Google Assistant or Google Home it’s important to keep in mind that these devices are designed to listen. This...

Diqee 360 Smart Vacuum why you should stop buying IOT devices

Hacker's spy on owner's of Diqee 360 smart vacuum with recent vulnerability Security researchers from Positive Technologies have released public details on two vulnerabilities affecting Dongguan...

Russia is trying to hack 3 2018 midterm election candidates Microsoft...

Microsoft reportedly block hacking attempts made by russia During Midterm Elections Microsoft said it detected and helped the US government to block Russian hacking attempts...

TOR BROWSER: A BROWSER FOR COMPLETE PRIVACY.

The recent Facebook scandal has made us worry about our privacy. we don't know who have our private chats, emails, phone numbers, passwords, credit...

How to run Apple phone IOS apps on MacOs

Now, Apple let's you run Iphone Ios Apps on MacOs computers Apple is making it easier for mobile developers to port their iOS apps to...

8 New Spectre-Class Vulnerabilities (Spectre-NG) Found in Intel CPUs

A team of security researchers has reportedly discovered a total of eight new "Spectre-class" vulnerabilities in Intel CPUs, which also affect at least a...

PDF files can be used to steal windows login password and...

Hack windows using PDF files and steal windows credentials PDF files can be weaponized by malicious actors to steal Windows credentials (NTLM hashes) without any...

APPLICATIONS

How to Enable Mute Tab option on Google Chrome Browser

Enable Mute Tab option on Google Chrome Browser You may want to mute a tab in google chrome browser but when you right click on...

Trust me you are a Hacker!

HOT NEWS