Subscribe for New Post Notifications

Ad Home

BANNER 728X90

100 GB of US Army Red Tape Classified Leaked - Yet Another NSA & Pentagon Shocker!

November 29, 2017

Following the Wikileaks in 2013 by Edward Snowden an Ex NSA agent there have been multiple leaks thanks to contractors, NSA’s own employees or some security bad practices. In a latest of what seems like an endless stream of confidential and potentially devastating leaks. Recently Chris Vickery, a Cyber Security Expert has revealed that over 100 GBs of data from an Army intelligence program codenamed Red Disk was left unprotected.  The disk image belongs to the US Army’s Intelligence and Security…

Read more »

Tips to Save Your Kids from the deadly BLUE WHALE CHALLENGE GAME

November 04, 2017

What is the Blue Whale Challenge?
The Blue Whale Challenge is an Internet game where players are assigned 50 different tasks by the game admin (also known as curator). A player has to complete all these tasks within 50 days and can only win it by completing the last task – which is to take their own life. Lot of teenagers & preteens get in to this trap and eventually die by playing this game. The Blue Whale Challenge hit headlines after it was linked to the death of 130 teenagers in Russia…

Read more »

Bad Rabbit-Ransomware Spreading Like Wildfire

October 26, 2017

Bad Rabbit Ransomware:

The ransomware, named as Bad Rabbit, is spreading like wildfire and has targeted corporate networks in Russia, Germany, Ukraine, and Turkey mainly. Organizations that have been targeted so far include Kiev Metro payment systems, Interfax and Fontanka (Russian news agencies), Odessa International Airport and the Ukraine’s Ministry of Infrastructure.

Victims download a fake Adobe Flash installer from infected websites and manually launch the .exe file, thus infecting themse…

Read more »

REVERSE ENGINEERING A MOBILE APPS

October 11, 2017

HOW TO FIND VULNERABILITIES IN MOBILE APPS THROUGH REVERSE ENGINEERING
As users rely more on mobile apps, they also put personal and employer information at risk. Application and device management measures cannot catch all malicious activity. As part of IT security, penetration testers use reverse engineering to catch app vulnerabilities before attackers do.
Mobile App Vulnerabilities
Like desktop programs, mobile apps are subject to malware. However, mobile devices are particularly vulnerable as …

Read more »