TCP Monitor Plus is a portable network toolkit
Portable network toolkit TCP Monitor Plus has had its first update since 2015, adding a snapshot feature and some handy display tweaks. The program opens with a scrolling graph ofRead More →
Portable network toolkit TCP Monitor Plus has had its first update since 2015, adding a snapshot feature and some handy display tweaks. The program opens with a scrolling graph ofRead More →
It starts with a phishing attack over SMS, continues with a bad app and ends with your stolen bank account. Android-targeting banking Trojan Marcher is on the rise, infecting devicesRead More →
Independent security researcher wants to make creating Tor hidden service versions of websites that much easier. More mainstream services and websites are moving towards the dark web. In 2014, FacebookRead More →
Home Ministry’s website mha.nic.in hacked; Hackers exploited Drupal vulnerability Unknown hackers today used a Drupal exploit to hack mha.nic.in, which is Indian government’s Ministry of Home Affairs website. Immediately afterRead More →
An ultranationalist developer from Serbia is behind a series of malware strains, including a new ransomware family named SerbRansom, discovered yesterday by security researcher MalwareHunter. The ransomware itself is notRead More →
The Internet Systems Consortium patched the BIND domain name system this week, addressing a remotely exploitable vulnerability it considers high severity and said could lead to a crash. The issueRead More →
Microsoft says it will fully power up its Azure SQL Database Threat Detection service this spring. This technology, which has been in preview mode for the past year or so,Read More →
For many of us hacking of printers seems to be next to impossible thing. But, a hacker has hacked more than 150,000 printers via the internet. The attack affected allRead More →
Recently I was given the task of performing command execution on a compromised MSSQL server with the following restrictions: No use of the xp_cmdshell stored procedure. No writing anything toRead More →
Short Bytes: WhatsApp has enabled two-step verification option for all its 1.2 billion users. After enabling this optional feature, any attempt to verify your phone on a smartphone will needRead More →