Tor Announces Official Release of Tor Browser 5.5 With New Features
Short Bytes: Tor Browser 5.5 is the first stable release in the 5.5 series of Tor. It is released for all the supported operating systems, including GNU/Linux, Mac OS XRead More →
Data Security News | Infosec Blog | Information Security Tutorials
Short Bytes: Tor Browser 5.5 is the first stable release in the 5.5 series of Tor. It is released for all the supported operating systems, including GNU/Linux, Mac OS XRead More →
Facebook patched the issue in about six hours. British security researcher Jack Whitton has identified a critical XSS (cross-site scripting) vulnerability on Facebook that could be leveraged via malicious PNG imagesRead More →
New Hacking Tools To Come Preinstalled With BackBox Linux 4.5 Security-Oriented OS. The release of BackBox Linux 4.5 has been announced by the developers of the BackBox Linux operating system,Read More →
Lenovo Security Advisory: LEN-4058 Potential Impact: Remote browsing of file system, unauthorized access of transferred files and denial of service attack that could crash the Windows SHAREit client Severity: Medium Summary: Vulnerabilities wereRead More →
A new ransomware has been spotted called 7ev3n that encrypts your data and demands 13 bitcoins to decrypt your files. A 13 bitcoin ransom demand is the largest we have seenRead More →
Linux. BackDoor.Xunpes trojan lets cyber-crooks take control and execute commands on your Linux machine. Threats to Linux computers are now appearing on a regular basis, and what was once dubbed aRead More →
Casey Smith recently shared his research on twitter, which is to reverse HTTP Shell by using JavaScript. I found it rather interesting and further analyzed this technique. 0x01 Introduction ObservingRead More →
In 2013 the FBI agents seized TorMail, now new information are emerging on the operations. Someone believes it was a surgical ops others accuse Feds of dragnet surveillance. In 2013 theRead More →
Back in 2013, the FBI seized TorMail, one of the most popular dark web email services, and shortly after started to rifle through the server’s contents. At the time, researchersRead More →
GCHQ insists on shooting itself in the foot with backdoored VoIP encryption protocol, developed in-house by CESG. Britain’s intelligence agency, GCHQ (Government Communications Headquarters), has already developed a phone encryptionRead More →