LATEST ARTICLES

Google Is Tracking You And Your Voice As Well

Google is tracking you and your voice as well, whatever you do using Google all those search details are stored carefully. It can be...

New OS X Backdoor Provides Restricted Access

New OS X Backdoor Provides Restricted Access Backdoor.MAC.Eleanor is the malware, dubbed by Bitdefender researchers which can be used for cyber-espionage and abuses Tor (The...

Adobe Flash Player In Target Of New Zero Day Exploit

Adobe Flash Player is under a very critical zero-day attack, and Adobe says it won't have a patch ready until later this week. The flaw...

BadTunnel Bug Big Threat To Microsoft Windows PC

BadTunnel Bug Big Threat To Microsoft Windows PC Yang Yu, founder of Tencent’s Xuanwu Lab, a researcher from China discovered a design flaw in Microsoft...

Blisk – A Web Browser For Smart Web Developers

Blisk - A Web Browser For Smart Web Developers. Blisk is a new web browser with multiple functionalities developed mainly for web developers for...

Well Known Ways Hackers Use To Hack Your Website

Almost everyday we hear something about hacking. Everyday atleast one giant company gets hacked and data gets stolen or websites get defaced or password...

MOUSEJACK: Hijack Wireless Mouse and Keyboard

MOUSEJACK: Hijack Wireless Mouse and Keyboard As we know, hackers can easily hack into any computers connected to internet and do whatever they want. Here...

Various ways a Hacker can use to Hack you !!

This is the hot topic right now in every area of the world. Every day there are almost millions of attacks been conducted from...

What is Spyware or Adware ??

Spyware also known as Adware is a software program or hardware program installed on a computer that sends information from the user's computer without...

Understand Cross Site Scripting (XSS)

Understand Cross Site Scripting (XSS) XSS basically stands for Cross Site Scripting. This method of hacking websites is quite common among hackers. Cross-site scripting is...