Malware Used in DNC Hack Has Roots in Chinese Open-Source Tool
X-Tunnel is roughly based on XTunnel PortMap. One of the malware variants used to infiltrate and hack the Democratic National Committee (DNC) back in April 2016 is based on aRead More →
X-Tunnel is roughly based on XTunnel PortMap. One of the malware variants used to infiltrate and hack the Democratic National Committee (DNC) back in April 2016 is based on aRead More →
In April, an independent researcher launched a tool called OnionScan, which probes dark web sites for various vulnerabilities and other issues. Now, another researcher has described how to deploy thatRead More →
Facebook’s troubles in Brazil seems to be never-ending. The war between the social media giant and the government has been taking on heat for a while as the company-owned messagingRead More →
Scammers exploit the recent a wave of attacks to trick victims with phishing offensive and steal sensitive data from the unaware users. Crooks always exploits the media attention on tragicRead More →
Our team recently discovered a new Android Trojan called SpyNote which facilitates remote spying. The builder, which creates new versions of the malware, recently leaked on several malware discussion forums.Read More →
Short Bytes: Password cracking is an integral part of digital forensics and pentesting. Keeping that in mind, we have prepared a list of the top 10 best password cracking toolsRead More →
Do you know that you can access your WeChat, Line and WhatsApp chats on your desktop as well using an entirely different, but fastest authentication system? It’s SQRL, or SecureRead More →
TIM BRYANT AND Brian Knudson spent two years preparing for the Cyber Grand Challenge, a $55 million hacking contest cooked up by Darpa, the visionary research operation inside the U.S.Read More →
Short Bytes: Peter Sunde, co-founder of The Pirate Bay, talked about the decentralization of the torrent ecosystem on TorrentFreak’s audio podcast series Steal The Show. Sunde said that relying onRead More →
A new wave of Locky malware emails have been making the rounds since yesterday — July 20, 2016 — with a critical new development, whereby the Windows executable is nowRead More →