DLL Hijacking Tutorial
Dll hijacking is a vulnerability that is caused by a misbehavior practiced by all versions of Windows.Many people believe that is a feature and not a bug because it wasRead More →
Dll hijacking is a vulnerability that is caused by a misbehavior practiced by all versions of Windows.Many people believe that is a feature and not a bug because it wasRead More →
Hacker also steals data from some hacked websites.A Moroccan hacker that calls himself ElSurveillance has defaced and stolen data from 79 escort websites, as part of a larger campaign heRead More →
iPlayer database malfunctions in DDoS attack, brings everything down, including main website and a radio app. On the morning of December 31, 2015, unknown attackers have downed the BBC website andRead More →
The PlayStation 4 and Xbox One systems are just PCs, and now hardware hackers have started doing some very cool things with at least one of these systems. Console-hacking groupRead More →
Researchers last week revealed a zero-day flaw that lets attackers take over a Linux system by pressing the backspace key repeatedly. Pressing backspace 17 to 20 times will overwrite theRead More →
Microsoft will now tell users of its email services when their accounts are being attacked by government hackers. The change in policy comes as Reuters reported that the company chose not toRead More →
The U.S. Department of Homeland Security and local law enforcement confirmed that Drug Traffickers are hacking surveillance drones on the border. Small drones are another powerful tool used by theRead More →
The Tor officially announced to launch the Tor Bug Bounty Program in the next year, a great news for the Tor community. The non-profit organization that is maintaining the TORRead More →
Former Sun VP and Linux Foundation CTO died under suspicious circumstances. Ian Murdock, founder of the Debian GNU/Linux distribution project, has died at the age of 42. His death, announcedRead More →
Palo Alto Networks unravels ‘BackStab’ technique which allows criminals to get access and steal your private data, via unprotected phone backups. The security company, Palo Alto Networks has disclosed details ofRead More →