Snapchat Photos Hacked over Third party application

snapchat-hacking

Snapchat database with more then 100 million users pictures and videos have been published by hackers. still not known the way that hackers have compromised the database but the first analyses shows that the leak was due to a third

Ads on Android Claims Fake Update That Install Unwanted Application

Mobile devices may contain personal information and important details for users and this attract cyber-criminal to exploit vulnerabilities on smartphones and install their malwares. Armando Orozco on Malwarebytes have posted a new entry over this week that targets Android system.

OpenSOC- Open Security Operations Center

cloud-monitoring

Security monitoring systems are important for detecting and analyzing security risks and incidents as they are happening. OpenSOC is an open source framework that integrates a variety of open source big data technologies in order to offer a centralized tool

“Your unread message will be deleted soon” is another Facebook scam

Social media resources continue to be used in spreading spams and promoting cyber-criminal attacks, new cases related to Facebook were spotted over this week where attackers are actively sending emails with links that hijack user accounts to promote the malicious

Laptop Buying Guide

touchpad

Buying a laptop can be a difficult task. With so many different kinds of laptops available and so many features to choose from, how do you decide which one to get? The following guide should help you to choose the

Scammers promise to pay you back as soon as they get home

Skype and any instant messaging system is trusted by user, this makes any account hacked can be used by attacker to make scams and have some income. New case have been posted on Kaspersky blog where attacker compromised one contact

MITMf – Framework for Man-In-The-Middle attacks

MITMF is another framework that can be used for man-in-the-middle attack. the tool is python based and have several plugins that adds more functionality during a penetration test. some of useful plugins are: jskeylogger – this plugin injects a javascript