Anonymous activists accused TikTok, a popular Chinese service, of mass surveillance of users and transferring data to Chinese authorities. TikTok collects information about user contacts, device, information about installed programs, etc. Anonymous participants urged users to remove this “spyware” … Continue Reading about Anonymous Movement Calls TikTok Chinese Spyware
Main Content
Featured Post
Latest News

Apple encouraged developers to new technologies
By Punit-Darji
Apple encouraged iOS and macOS app developers to favor new web technologies. During a short presentation at WWDC 2020 June 22-26, Apple revealed some internal statistics to convince developers to use new technologies and protocols such as IPv6, HTTP / 2, TLS 1.3 and Multipatch TCP. According to Apple Internet Technology Engineer Jiten Mehta, the popularity of IPv6 (the next … Continue Reading about Apple encouraged developers to new technologies

steal facebook credentials and contained malicious code
By Punit-Darji
This month, Google removed 25 Android apps from the Play Store because steal facebook accounts with passwords . At the time of removal of the application, a total of 2.34 million times were downloaded. Applications were equipped with legitimate functionality, but also contained malicious code. The creator of all 25 applications is the same cybercriminal grouping. Despite the fact that the … Continue Reading about steal facebook credentials and contained malicious code

Experts “broke” the barrier between Wi-Fi and Bluetooth
By Punit-Darji
A group of German and Italian scientists have developed a new attack to circumvent the separation between Wi-Fi and Bluetooth technologies used on the same device (smartphone, laptops and tablets). The attack, dubbed Spectra, runs on “combined” chips that process various types of wireless communications, including Wi-Fi, Bluetooth, LTE, etc. “Spectra’s new class of vulnerabilities is based on … Continue Reading about Experts “broke” the barrier between Wi-Fi and Bluetooth

Cybercriminals exploit three-year vulnerability in Magento plugin
By Punit-Darji
The Federal Bureau of Investigation has reported that cybercriminals exploit a three-year vulnerability (CVE-2017-7391) in the MAGMI plug-in (Magento Mass Import) for Magento in order to hack online stores and create a malicious script that can record and steal customer payment card data. The problem is a Cross-Site Scripting (XSS) vulnerability, the exploitation of which allows an attacker to … Continue Reading about Cybercriminals exploit three-year vulnerability in Magento plugin
Hacking

InviZible Pro – Android application for Internet privacy and security
By Punit-Darji
InviZible Pro includes a well-known modules DNSCrypt, Tor , Purple I2P. They are used to achieve maximum security, privacy and comfortable use of the Internet. This application is designed for Android … Continue Reading about InviZible Pro – Android application for Internet privacy and security

India’s First Processor Shakti is ready for app development
By Punit-Darji
Shakti is processor developed by India. The Indian Institute of Technology in Madras has has released the software development kit (SDK) for its open-source Shakti processor. Shakti is based on the … Continue Reading about India’s First Processor Shakti is ready for app development

Top 10 Browser Extensions for OSINT Researchers
By Punit-Darji
For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the internet for clues during an investigation. These are a list of my top ten … Continue Reading about Top 10 Browser Extensions for OSINT Researchers

How to find breached Email : Whatbreach
By Punit-Darji
WhatBreach is a tool to search for breached emails and their corresponding database. It takes either a single email or a list of emails and searches them leveraging haveibeenpwned.com's API, from … Continue Reading about How to find breached Email : Whatbreach
Tools Updates

Best disposable email provider
By Punit-Darji
Top 5 disposable email provider Disclaimer : Please do not use any of these services for private and sensitive information sharing. We do not promote any illegal activities which you can perform by … Continue Reading about Best disposable email provider

How to install tails operating system on
By Punit-Darji
Tails is a Linux-based operating system. Its main goals are to promote anonymity on the Internet, the safe storage of data, not to leave traces. All network connections and programs are configured to … Continue Reading about How to install tails operating system on

Unc0ver team published a jailbreak for iOS 13.5
By Punit-Darji
The famous Unc0ver jailbreak team managed to detect a previously unknown vulnerability in the iOS kernel, exploit it and create a working jailbreak. The tool is suitable for hacking most (if not all) … Continue Reading about Unc0ver team published a jailbreak for iOS 13.5

Remote Android Management Suite : L3MON
By Punit-Darji
In recent times, distinctive kinds of Android-powered gadgets are often used on a daily foundation. In case you're a proud owner of an Android tool, at times you can have felt the want to access it … Continue Reading about Remote Android Management Suite : L3MON
Proof Of Concept

Experts “broke” the barrier between Wi-Fi and Bluetooth
By Punit-Darji
A group of German and Italian scientists have developed a new attack to circumvent the separation between Wi-Fi and Bluetooth technologies used on the same device (smartphone, laptops and tablets). The attack, dubbed … Continue Reading about Experts “broke” the barrier between Wi-Fi and Bluetooth

DoS on Bluetooth. Reality of “Bluetooth Hacking”
By Punit-Darji
In the world, there are not many things that infuriate almost everyone without exception. This is spring-autumn slush, summer hot water cut-off and schoolchildren with portable Bluetooth speakers. And if with the first … Continue Reading about DoS on Bluetooth. Reality of “Bluetooth Hacking”

Vulnerability in Slack allowed hijacking accounts
By Punit-Darji
Slack developers fixed a vulnerability that allowed to capture other people's accounts. The problem was discovered in November 2019 by information security researcher Ivan Castodio (Evan Custodio). Castodio discovered … Continue Reading about Vulnerability in Slack allowed hijacking accounts