7 C
Texas

CATEGORY

Security

Second Hand SD Cards Still Holding Personal Data

SD cards are one of the most popular storage solutions for personal usage, especially for mobile devices. These storage devices are cheap, small, fast...

Clipboard Hijacker monitoring Millions of Bitcoin Addresses!

In the world of cryptocurrency, everything is so cryptic! Take the sender’s address for example. It’s such a long string of some GIBBERISH characters...

RAMpage – Rowhammer Variant Affecting Android Devices

In the world of security, there seems to be nothing so secured any more. Every now and then, there are new vulnerabilities found in...

UPnP DDoS Attacks are becoming a Reality

DDoS attacks are one of the most popular types of attacks that can bring down a website or a server and put it into...

How to install freeIPA on CentOS 7?

FreeIPA is an integrated security information management solution combining Linux (Fedora), 389 Directory Server, MIT Kerberos, NTP, DNS, Dogtag (Certificate System). It consists of...

Microsoft Edge Bug – Exploiting Personal Info Made Easy

A developer from Google discovered a brand new type of bug in the Edge browser that allows malicious activity without any notification of the...

How to install NTP in Ubuntu server 18.04?

Network Time Protocol (NTP) is an Internet protocol for synchronizing computer system clocks through packet routing in networks with variable latency. NTP uses UDP...

NEW! AIO Android Malware – MysteryBot

Android is the most popular operating system for smart gadgets. It’s open-source and packs such a huge power that all the major smart gadget...

New Flaw in Intel CPUs – Lazy FP State Restore

Processor is the most important of all the hardware components of any computer as it manages all the tasks and enables us performing all...

Android Devices with Exposed ADB Port

In the recent days, security has always been one of the greatest concerns of the internet. Now, it’s another vulnerability/flaw in many Android devices...

Latest news