Best Hacking Movies You Must Watch

BlackHat   Who Am I: No System Is Safe?   Hackers Happy Xmas in Advance Happy New Year [Valor , Ethnicity , Integrity , Commitment , Sacrifice]

Advertisements

Windows “Process Doppelganging” Attack Major AV’s

Process Doppelganging is similar to Process Veil Framework – a method used by hackers a few years ago but now detected by most security software. Doppelgänging is more advanced and evasive. Also, it’s much harder to detect. The difference lies in how it works. Process Doppelgänging utilizes a feature called Transactional NTFS (TxF) in Windows to …

MailSploit — Flaw Affects 30 Popular Email Clients

If you receive an email that looks like it's from one of your friends, just beware! It's possible that the email has been sent by someone else in an attempt to compromise your system so you must go through Analysis of  Email Headers. The set of vulnerabilities, dubbed MailSploit, affects Apple Mail (macOS, iOS, and …

Samsung Hits 1.7Gbps In 5G Speed Tests On A Moving Train

Generation of the telecommunication renews every decade. We are about to see the 5th generation in the coming years which promises gigabit speeds over wireless connections. Various companies are working to roll out their 5G tech before others. Last month, Intel announced their 5G modems and Qualcomm has also demonstrated their 5G tech in the …

Large Scale Enterprises to Embed Two-Factor Authentication

IT decision-makers need to evolve beyond two-factor authentication (2FA) and design new ways to make the user verification process intelligent and risk-aware. Existing 2FA systems provide some protection against cyber risks, they are not as accurate solution. Instead,  users explore a mixture of push notifications and advanced technologies to verify identities. Attackers Exploit Two-Factor Authentication …

PMO Cyber Chief asks Firms & Experts to align with Govt for a Secure Ecosystem / Digital Era of Cyberspace

Companies operating in cyber security Solutions and services domain must work more closely with central organizations to secure the entire digital ecosystem across India, Cyber Security Chief under the Prime Minister's Office, Dr Gulshan Rai said on Wednesday. Inaugurating Cyber Resilience Summit here on Wednesday, Mr Rai said cyber security companies need to shun their …

Truecaller denies being a spyware after received Intell Inputs

Caller identification app Truecaller on Thursday said that it was not a spyware after the Intelligence Bureau reportedly released inputs to delete some 40 Chinese mobile apps to avoid a possible cyber attack. “We’d like to clarify Truecaller is a Swedish company,” it said on Twitter. “We’re unsure why the app is mentioned [in the …