Biggest iPhone Hack in History: Here’s What iOS Users Need to Know Now

Here’s What iOS Users Need to Know Now

If you’re not a little worried about your iOS operating system turning against you in light of recent events, you should be. The biggest security breach in Apple history is upon us and those who do not get savvy could

GCAT – Fully featured backdoor that uses Gmail as a C&C server

There are many tools that allow to generate backdoors and they are used during a penetration testing program or security awareness where the presenter demonstrate how it is easy to have a full control on a remote vulnerable system. The

TaskExplorer- Explore Tasks on Mac OS

TaskExplorer is a tool that you can use to explore running processes on Mac operating system. some of the features are: Signing Status quickly view, (or filter) tasks that are signed by Apple, 3rd-parties, or are unsigned VirusTotal Integration detection

Ghost Push Malware Infect More Than 600K Users Daily

Cheetah Mobile security researchers uncovered a new malware that is infecting 600,000 Android users daily. the malware is called Ghost Push and up to now it is circulating using non official Google app stores. The current estimation of compromised devices is 14,847

NoSQL EXPLOITATION FRAMEWORK – Framework For NoSQL Scanning and Exploitation

Any database may include sensitive information such as usernames , passwords or users data. This makes a proper security assessment with whole architecture review is required for identifying security gaps that can be used by hackers to compromise the system.

26 Android phones pre-infected with spyware


G Data a German based security company have found that many popular Android smartphone are sold with a shipped spyware for tracking users activity. The malware is hidden on the device with a legitimate application such as Facebook or Google Drive

2 Important Lessons to Learn From the Ashley Madison Hack

2 Important Lessons to Learn From the Ashley Madison Hack

No matter how you feel about Ashley Madison’s business model, we can all admit there’s a lot to learn from the website’s recent data breach. In case you don’t have all of the facts, here’s a quick update: Ashley Madison