As the use of photo editing and enhancing software has increased, so has the influx of tons of free photo editing apps. Both, professional…
General
Windows 10 Finger command exploited through phishing for malware download
Hackers are utilizing the typically innocuous Windows 10 Finger command to download and install vindictive indirect access on casualties’ gadgets. The ‘Finger’ command is…
New Malware “Raindrop” Exposed in SolarWinds Hack
Another malware named the “Raindrop” has been discovered by Symantec Threat Intelligence in the Solarwinds hack of the supply chain. The Raindrop loader was…
EMA confirms the breach and exposure of COVID vaccine documents. Vaccine developer Pfizer also found affected
According to the European Medicines Agency (EMA), few of the documents relating to the COVID vaccine, stolen during a cyberattack attempted in early December,…
Only two guesses left for a password worth £200 Million Bitcoin!
A San Francisco resident, Stefan Thomas has only two tries left to unlock his hard drive that contains 7,002 Bitcoins-that were worth £31,245 yesterday.…
What cloud computing services mean for your business
Despite all of its unfortunate events, 2020 has been a revolutionary year. So many individuals as well as corporations, be it small or large…
Google Voice Assistant says ‘OK Google, Do nothing’? Google India News
By now, all of us have become very much familiar with Google Voice assistant and its amazing abilities. The voice assistant has made our…
“People Nearby” Feature Of Telegram App susceptible than you think
The Telegram app “People Nearby” feature can be mishandled to expose a client’s exact location, an analyst said. It is a feature that permits…
Top 6 Web Application Hacking Tools of 2020: Ethical Hacking Tools
Looking back to probably the best hostile web application hacking tools that were dispatched in the course of recent months… The week paving the…
Facebook phishing campaign utilized to stole 615000+ credentials using FB ads
Cybercriminals are leading Facebook phishing scams with huge scope zeroed down toward taking casualties’ login certifications… Specialists from security firm ThreatNix detected another huge…