How to Connect Android to PC/Mac Without WiFi
Quite a few times, you might need to display Android screen on your PC or Mac to to play games, stream video music, demonstrate the tutorials, share photos by controllingRead More →
Quite a few times, you might need to display Android screen on your PC or Mac to to play games, stream video music, demonstrate the tutorials, share photos by controllingRead More →
Insecure configurations expose car telematics to hacking. Industrial vehicles like trailer trucks, delivery vans, or buses that have an Internet connection, can be tracked, and even hacked, if they use insecureRead More →
ProofPoint uncovered a new cyber espionage campaign dubbed Operation Transparent Tribe targeting Indian diplomatic and military entities. A new cyber espionage campaign dubbed Operation Transparent Tribe is targeting diplomats and military personnelRead More →
Someone hijacked the Transmission BitTorrent client project website to spread ransomware to Mac OS X users. Over the weekend, a malicious party has managed to hack the Transmission BitTorrent client forRead More →
The resurgence and continued prevalence of macro malware could be linked to several factors, one of which is their ability to bypass traditional antimalware solutions and sandboxing technologies. Another factor is the continuousRead More →
Diplomats and military personnel in India have been victimized in targeted espionage attacks that use a number of means of infection including phishing and watering hole sites. Researchers at ProofpointRead More →
Short Bytes: History of hacking always fascinates us as it tells us about the best hackers from the earlier times. But is not interesting to know that what they didRead More →
What’s driving the surge in hidden services—is it government tampering? In recent weeks, the number of “hidden services”—usually Web servers and other Internet services accessible by a “.onion” address on theRead More →
Last summer we shared a story about the SweetCaptcha WordPress plugin injecting ads and causing malvertising problems for websites that leveraged the plugin. When this plugin was removed from the officialRead More →
Researchers at threat defense company Skycure have uncovered an Android proof of concept malware that uses accessibility services to allow attackers to spy on and even control a device. ItRead More →