Hackers exploit 0Day vulnerability in WhatsApp to transfer spyware | CVE-2019-3568
Hacking and Infosec Tech News Technology

Hackers exploit 0Day vulnerability in WhatsApp to transfer spyware | CVE-2019-3568
WhatsApp suffers a remote code execution vulnerability, which allows hackers to exploit WhatsApp users through a phone call - CVE-2019-3568

WhatsApp is the most popular messaging application claims to be the most secure social media platform. It was considered the most secure platform due to the variation of encryptions. Not only encryptions but also the security layers it uses to protect the users. But someone quoted a really beautiful line regarding security: “Every new security […]

What is Termux
Hacking and Infosec

What is Termux? Installation, Usage and 5 best hacking tools for termux
A detailed guide about Termux answering all questions about installation, usage, doing hacking, best hacking tools for termux

There are some most frequently asked questions we often encounter. How to use Android for hacking? What is the best app for hacking on android? The answer to these queries is Termux. But there are a lot of misconceptions about this application. Many of us think termux turns the android into a hack machine. Well, […]

Password Stealing
Ethical Hacking Hacking and Infosec

Password Stealing: How hackers steal email/social media passwords?

We’ve so far discussed the login process, and how the passwords are stored. We’ve also touched a little bit about types of access and definition of unauthorized access. Now let’s move further. And look at some ways of gaining unauthorized access over a targeted user/system. Such access depends on particular circumstances. Maybe it’s a developer’s […]