It’s Finally Here, Samsung And LG Could Launch 100,000 Foldable Phones Later In 2017

Short Bytes: After years of waiting. it has come to

Israeli Phone Hacking Firm Cellebrite Hacked; 900 GB data stolen

Cellebrite, the Israeli spy firm who were reportedly used by

How To Easily Clear System Cache In Ubuntu

The concept of the cache memory is basically very good. It

Adobe & Microsoft released New Critical Security updates for software installed on hundreds of millions of devices

Technology giants Adobe, Microsoft  Tuesday each released security updates and issued

D-Wave Just Open Sourced Its Major Quantum Computing Tool

Short Bytes: In an attempt to propel the collaborative development

Hamas Compromised Dozens of IDF Soldiers’ Phones Using Seductive Female Images

The IDF and Israeli Security Agency Shin Bet have jointly

judasdns – Nameserver DNS poisoning attacks made easy

judasdns –  Nameserver DNS poisoning attacks made easy ,, `7MMF’

Hacker Steals 900 GB of Cellebrite Data

The hackers have been hacked. Motherboard has obtained 900 GB

Adobe, Microsoft Push Critical Security Fixes

Adobe and Microsoft on Tuesday each released security updates for

Brute Forcing Multiple Databases using HexorBase

HexorBase is a database application designed for administering and auditing

Watch Tech Support Scam Take Over a Browser via Facebook Ads

Facebook users in France are subject to a wave of

China Collects Massive Personal Data Of All Citizens — And It’s Up For Sale

Short Bytes: It’s not hidden that China keeps a close

H2 — This Futuristic Smartphone Can See “Inside” All Objects

Short Bytes: A Chinese company named Changhong has created a phone,

reversemap – Analyse SQL injection attempts in web server logs

reversemap –  Analyse SQL injection attempts in web server logs

automato – automating some of the user-focused enumeration tasks during an internal penetration test

automato – automating some of the user-focused enumeration tasks during

Vuurmuur – a powerful firewall manager built on top of ​iptables on Linux

Vuurmuur – a powerful firewall manager built on top of

Steghide – Brute Force Tool

Steghide  Brute Force Tool Execute a brute force attack with

Attacking UEFI Runtime Services and Linux

Attackers with physical access are able to attack the firmware

ShadowBrokers offers for sale the stolen NSA Windows Hacking Tools

The ShadowBrokers is the hacker crew stolen the arsenal of

How to Convert JPG Images to an Animated GIF in Linux With Command Line

In the recent times, all the social media platforms are flooded