Latest Bluetooth Hacking Techniques

Latest Bluetooth hacking techniques expose new attack vectors for hackers

BlueBorne is a vulnerability discovered in several Bluetooth implementations. Btlejacking relies on the jamming vulnerability tracked as CVE-2018-7252 and affects BLE devices with...

Setup Proxychains in Linux

What is Proxychains? Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...
Best Hacking Documentaries That You Should Watch Right Now

Best Hacking Documentaries That You Should Watch Right Now

In order to become an ethical hacker in the 21st century, you should know some coding laterally with good inspiration.
Skype vulnerability

This Skype vulnerability allows you to bypass Android’s phone lock

A security researcher found a vulnerability in Skype’s Android app which allows users to access several app functions without entering the passcode...
Trojan Malware

Emotet Banking Trojan is back again

Emotet, the infamous banking trojan has emerged again in the radar after a dip in its activity. The latest version of Emotet can...

Millions of dollars stolen in scam by taxi drivers in Toronto, Police arrests six

Since 2018, the Greater Toronto Area is facing a major taxi fare scam that involves drivers defrauding customers. The criminal drivers rely on...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts