2020
2019
- 25 NovemberNew WhatsApp Bug Could Have Let Hackers Secretly Install Spyware On Your Devices
- 13 JuneAndroid’s Built-in Security Key Now Works With iOS Devices For Secure Login
- 13 JuneRAMBleed Attack – Flip Bits to Steal Sensitive Data from Computer Memory
- 12 JuneYour Linux Can Get Hacked Just by Opening a File in Vim or Neovim Editor
2018
- 31 Octobertest
- 30 SeptemberFacebook Hacked — 10 Important Updates You Need To Know About
- 22 SeptemberPowerful Android and iOS Spyware Found Deployed in 45 Countries
- 22 SeptemberTwitter API Flaw Exposed Users Messages to Wrong Developers For Over a Year
2017
- 10 JulyReliance Jio Customers’ Data Allegedly Hacked – Company Denies Breach
- 6 JulyWordPress Plugin Used by 300,000+ Sites Found Vulnerable to SQL Injection Attack
- 15 MayWannaCry Kill-Switch(ed)? It’s Not Over! WannaCry 2.0 Ransomware Arrives
- 15 MayProtect Against WannaCry: Microsoft Issues Patch for Unsupported Windows
- 31 MarchTelegram Messenger Adds AI-powered Encrypted Voice Calls
- 21 FebruaryWebsites Can Now Track You Online Across Multiple Web Browsers
- 17 JanuaryDon’t Fall For This Dangerously Convincing Ongoing Phishing Attack
- 2 January3 Critical Zero-Day Flaws Found in PHP 7 — One Remains Unpatched!
2016
- 27 DecemberCritical PHPMailer Flaw leaves Millions of Websites Vulnerable to Remote Exploit
- 17 DecemberDNSChanger Malware: Hijacking Routers to Target Every Connected Device
- 3 DecemberOver 1 Million Google Accounts Hacked by ‘Gooligan’ Android Malware
- 26 NovemberAntivirus Firm Kaspersky launches Its Own Secure Operating System
- 10 NovemberHow to Add a Project to Github using command line?
- 7 NovemberSeedr – Download Torrent Easily
- 5 NovemberGitLab Patches Command Execution Vulnerability
- 2 NovemberMultiple Critical Remotely Exploitable Flaws Discovered in Memcached Caching System
- 30 SeptemberHow To Install R on Ubuntu 16.04
- 22 SeptemberGoogle Allo, WhatsApp, Messenger, Telegram; which is the best messaging app for you?
- 22 SeptemberCisco finds new Zero-Day Exploit linked to NSA Hackers
- 31 AugustChainfire’s SuHide — Now You Can Hide Your Android Root Status On Per-App Basis
- 28 AugustWiFi Hacker – Hack Wifi using WifiSlax WPA-WPA2
- 27 AugustHow to stop WhatsApp from sharing your personal data with Facebook
- 26 AugustApple issues critical iOS update to thwart ‘Pegasus’ malware
- 24 AugustWhy you SHOULDN’T “type Amen and share” posts.
- 23 AugustHow To Move an Apache Web Root to a New Location on Ubuntu 16.04
- 23 AugustTraffic Hijacking Linux Flaw Affects 80% of Android Devices
- 14 Augustlimit the amount of WIFI bandwidth roommate or bad office colleague uses?
- 10 AugustData Breach — Oracle’s Micros Payment Systems Hacked
- 9 AugustWarning! Over 900 Million Android Phones Vulnerable to New ‘QuadRooter’ Attack
- 5 AugustBest Password Manager
- 3 AugustHack Brief: Hackers Breach the Ultra-Secure Messaging App Telegram in Iran
- 31 JulyWarning: 100+ Tor Nodes Designed to Spy on Hidden Services
- 25 JulySome Security Measures to Protect Your Servers
- 24 JulyHow to Protect Your Server Against the HTTPoxy Vulnerability
- 18 JulyUse Tor? Riffle promises to protect your privacy even better
- 17 JulyHow-To: Create a Cron Job to start MySQL if it Stops
- 14 July3 Popular Drupal Modules Found Vulnerable — Patch Released
- 13 JulyHow to download and play Pokemon Go without Virus
- 3 JulyHow to build secure Android application
- 2 JulyAndroid malware ‘Hummer’ could be biggest trojan ever
- 8 JuneServer-side YouTube V3 OAuth API (CakePHP)
- 25 AprilFree Ransomware Detection Tool for Mac OS X Users
- 24 FebruaryJAVASCRIPT VULNERABILITIES AND REMOVING PERSONAL METADATA FROM FILES
- 22 FebruaryWHOLE DISK ENCRYPTION AND FILE SHREDDING
- 21 FebruaryPGP CONTINUED
- 20 FebruaryPGP, TAILS, VIRTUAL BOX
- 19 FebruaryINTRODUCTiON TO SECURE COMMUNICATION – TOR, HTTPS, SSL
- 18 FebruaryEverything You Need to Know on Tor & the Deep Web
- 10 FebruaryAn overview of the top Java IDEs
- 10 February‘CrashSafari’ Links Will Kill Your iPhone
- 18 JanuaryApple’s Mac OS X Still Open to Malware, Thanks Gatekeeper
- 18 January602 Gbps! This May Have Been the Largest DDoS Attack in History
- 18 JanuaryThe Most Trusted Messenger for Private Chat
- 14 JanuaryHOW TO RUN NOT WORKING APPS ON ROOTED ANDROID
2015
- 30 DecemberHow To Install and Configure Elasticsearch on Ubuntu 14.04
- 29 OctoberHow Hackers Can Hack Your Chip-and-PIN Credit Cards
- 14 OctoberGoogle Secretly Records Your Voice
- 11 OctoberMultiple XSS security vulnerabilities in the Visual Composer WordPress plugin
- 8 OctoberTerrorists Targeting Indian Government
- 8 OctoberLockerPin Ransomware Resets PIN and Permanently Locks Your SmartPhones
- 8 OctoberSQL Injection : How It Works
- 8 OctoberHow to Enable God Mode in Windows 10?
- 8 OctoberHow to Backup your WhatsApp data onGoogle Drive
- 6 OctoberTurn Off Auto-play Facebook Videos on iPhone IOS 9.X.X
- 5 OctoberHow to Install Android 6.0 Marshmallow and When will Your Smartphone Get it?
- 5 OctoberYiSpecter — First iOS Malware that Attacks both: Non-jailbroken and Jailbroken Devices
- 3 October‘Dropbox Hacker’ Claims To Have 7 Million Passwords
- 3 OctoberTens of Thousands of Routers, IP Cams Infected by Vigilante Malware
- 3 OctoberAvast Antivirus: X.509 Error Rendering Command Execution
- 2 OctoberPhotos in Wifi v1.0.1 iOS
- 2 OctoberBosch Security Systems – XML Injection
- 2 OctoberLaunching 20 DDoS Attacks/Day at 150Gbps
- 2 OctoberDisable your lock screen using custom recovery and “Pattern Password Disable”
- 2 OctoberHow to bypass Android’s lock screen pattern
- 2 OctoberHow to Root
- 2 OctoberWebsploit Wifi Jammer
- 2 OctoberInstalling VPN on Kali Linux
- 2 OctoberWinRAR Vulnerability Puts 500 Million Users At Risk
- 2 OctoberActive malware campaign uses thousands of WordPress sites to infect visitors
- 2 OctoberStagefright Bug 2.0 One Billion Android Devices Vulnerable to Hacking
- 2 OctoberApple iOS 9.0.2 Update Patches Lock Screen Bypass Exploit
- 2 OctoberTypes of Penetration testing
- 2 OctoberGoogle Dorks 2015