 Centos
HAProxy
Linux Tutorials
Load Balancing
Enable HAProxy stats in Cent OS
Centos
HAProxy
Linux Tutorials
Load Balancing
Enable HAProxy stats in Cent OS
HAProxy Stats provides a lot of information about data transfer, total connection, server state etc. After installing HAProxy if you wan...
 Centos
HAProxy
Linux Tutorials
Load Balancing
Enable HAProxy stats in Cent OS
Centos
HAProxy
Linux Tutorials
Load Balancing
Enable HAProxy stats in Cent OS
HAProxy Stats provides a lot of information about data transfer, total connection, server state etc. After installing HAProxy if you wan...
 Distro
Download Lightweight Portable Security
Lightweight Portable Security (LPS)1.5.0
Linux
OS
USA
New Security Operating System Released, Developed by US Airforce
Distro
Download Lightweight Portable Security
Lightweight Portable Security (LPS)1.5.0
Linux
OS
USA
New Security Operating System Released, Developed by US Airforce
Lightweight Portable Security (LPS) 1.5.0, a thin Linux operating system that creates a secure end node from trusted media on almost a...
 Cyber Crime
DDoS
GitHub
Hacking News
News
GitHub under DDoS Attack
Cyber Crime
DDoS
GitHub
Hacking News
News
GitHub under DDoS Attack
It’s pretty clear that GitHub is one of the favorite targets for distributed denial-of-service (DDOS) attacks. The service is currently...
 Exploit
PHP
Programming
Vulnerability
Web Development
New Exploits for Old PHP Vulnerability
Exploit
PHP
Programming
Vulnerability
Web Development
New Exploits for Old PHP Vulnerability
Close to two years ago, a serious vulnerability in PHP was accidentally disclosed after it was discovered months prior during a hacking ...
 Android
Mobile
Privilege Escalation
Vulnerability
One Billion Android Devices Vulnerable to Privilege Escalation
Android
Mobile
Privilege Escalation
Vulnerability
One Billion Android Devices Vulnerable to Privilege Escalation
The first deep look into the security of the Android patch installation process, specifically its Package Management Service (PMS), h...
 Fake Tools
Tor
Tor Browser
Beware of fake TOR Browser
Fake Tools
Tor
Tor Browser
Beware of fake TOR Browser
Members of the Tor anonymity service are warning that a Tor iOS app available in Apple's highly curated App Store since November is ...
Security researcher Behrouz Sadeghipour has identified a number of vulnerabilities on a Hong Kong subdomain of Yahoo ( hk.yahoo.net )....
 Gadgets
Mobile
NETRA
ophthalmoscope
Technology
Now Test your eyesight with your smatphone
Gadgets
Mobile
NETRA
ophthalmoscope
Technology
Now Test your eyesight with your smatphone
Apps and downloads are old hat. The smartphone can now be adapted to test a person's eyes, and is claimed to be India's first mo...
Algeriano a hacker from Team Cyber Criminals a group of Pakistani hackers hacked worlds leading automobile companies domains reserved f...
 Android
Malwares
Anti-Virus Killer Android Virus, Detected
Android
Malwares
Anti-Virus Killer Android Virus, Detected
A new variation of mobile malware that affects Android based devices has been detected by the Quick Heal Labs . An innovative feature of ...
 Data Leak
Hacking News
News
Rucyborg
Russian Hackers
Russian Intelligence and Spy Company SearchInform Hacked, Data Leaked
Data Leak
Hacking News
News
Rucyborg
Russian Hackers
Russian Intelligence and Spy Company SearchInform Hacked, Data Leaked
Today Russian hacktivist @Rucyborg has announced a leak of data from Searchinform and sent a message out to its director. The leak wa...
 Mobile
Vulnerability
WhatsApp
New Vulnerability found in WhatsApp, read private chats
Mobile
Vulnerability
WhatsApp
New Vulnerability found in WhatsApp, read private chats
A security consultant has uncovered a security hole in WhatsApp , the instant messaging platform recently acquired by Facebook . The fl...
 Aircrack
Centos
Hacking Tools
Linux Tutorials
Ubuntu
Installing Aircrack on CentOS 6.4 and Ubuntu 13.10
Aircrack
Centos
Hacking Tools
Linux Tutorials
Ubuntu
Installing Aircrack on CentOS 6.4 and Ubuntu 13.10
I've got so many queries about installing Aircrack suite on CentOS or Ubuntu. Today I will show you how to install Wi-Fi cracking sui...
DDoS attacks via other sites execution tool ( DAVOSET ) - a tool for use by Abuse of Functionality and XML External Entities vulnerabili...
 Hacking News
Malwares
News
Russian Hackers
Snake
Stuxnet
Ukraine
Russia attacks Ukraine with cyber weapon, Snake
Hacking News
Malwares
News
Russian Hackers
Snake
Stuxnet
Ukraine
Russia attacks Ukraine with cyber weapon, Snake 
Dozens of computer networks in Ukraine have been infected by an aggressive new cyber weapon called Snake , according to expert analysis....
 Cyber Crime
Data Leak
Hacking News
Korean Hackers
News
Privacy
Personal info of 12 million KT customers Leaked
Cyber Crime
Data Leak
Hacking News
Korean Hackers
News
Privacy
Personal info of 12 million KT customers Leaked
Two men have been arrested in connection with the massive KT Corp. data breach that resulted in the theft of personal and financial info...
 Anonymous
Data Leak
Hacking News
News
Russian Hackers
Russian Defence Hacked, 500+MB Data Leaked
Anonymous
Data Leak
Hacking News
News
Russian Hackers
Russian Defence Hacked, 500+MB Data Leaked
Today Russian hacktivist Rucyborg has announced a big leak of files from Russian Defence Export ROSOBORONEXPORT ( http://www.roe.ru/ )...
 Bitcoin
Cyber Crime
Hacking News
News
Russian Hackers
Source Code
Bitcoin Bank Hacked, Theft of $6,20,000
Bitcoin
Cyber Crime
Hacking News
News
Russian Hackers
Source Code
Bitcoin Bank Hacked, Theft of $6,20,000
Flexcoin, famous for making bitcoin banking as easy as regular banking, is no more. The company shut its doors on Tuesday morning after...
 Android
Malwares
Mobile
VPN
Vulnerability
Vulnerability in Android Jelly Bean and Kitkat
Android
Malwares
Mobile
VPN
Vulnerability
Vulnerability in Android Jelly Bean and Kitkat
The researchers at CERT-IN , the Indian governments agency that monitors cyber threats, issued the advisory about the VPN flaw a few da...
 Cisco
News
RSA Conference 2014
security spending
Cisco offers $300k for security solutions
Cisco
News
RSA Conference 2014
security spending
Cisco offers $300k for security solutions
Cisco has launched a new competition and is calling on "visionaries, innovators, and implementers" to propose practical soluti...
 Anonymous
Mozilla
News
Tor
Tor Instant Messager
Tor develops its own anonymous Messenger
Anonymous
Mozilla
News
Tor
Tor Instant Messager
Tor develops its own anonymous Messenger
The Tor Foundation is moving forward with a plan to provide its own instant messaging service. Called the Tor Instant Messaging Bundle, ...