Samsung Exynos kernel exploit offer Root without Flashing
Samsung Exynos kernel exploit offer Root without Flashing A user over at the XDA Developers Forum has gone searching through Samsung Exynos kernels and has found one whopper of an […]
Samsung Exynos kernel exploit offer Root without Flashing A user over at the XDA Developers Forum has gone searching through Samsung Exynos kernels and has found one whopper of an […]
Hunting vulnerabilities in SCADA systems, we are still too vulnerable to cyber attacks Stuxnet case is considered by security expert the first concrete act of cyber warfare, a malware […]
Yahoo data leak by Virus_Hima, Why do we need a proactive security? AUTHOR : PIERLUIGI PAGANINI In November I was contacted for first time by the Egyptian Hacker named ViruS_HimA who announced […]
Security weakness in Android App SSL Implementations The most common approach to protect data during communication on the Android platform is to use the Secure Sockets Layer (SSL) or […]
Microsoft issues critical update for Windows 8 Microsoft has released an update for Windows 8 that fixes several vulnerabilities in Internet Explorer, Word and Exchange. This is the […]
Kernel Tuner for Android Review Kernel Tuner is an awesome utility for those who are use Android-based HTC smartphones, especially with multi-core processors. The phone needs to be […]
Team Ghostshell, a Hacktivists group of hackers, who , earlier were in news for hacking Major Universities around The Globe and leaked 120,000 records, are once again hit major organisations and expose around 1.6 million […]
The common thing among rootkits is that they can hide themselves from detection. Rootkit stops security applications from functioning and hence cannot be detected. It is also capable of downloading additional malware […]
Mumbai resident loses Rs 1.75 lakh to cyber crime Mumbai-based Chinmay Dash reportedly lost Rs 1.75 lakh to cyber crime recently, according to a report by The Times of India. […]
ReVuln Ltd. , a small security company headed by Donato Ferrante and Luigi Auriemma, post a video that demonstrates that how attacks can gain root on the appliances. Samsung […]