Top 5 web security testing tools
Hacking and Infosec Technology Top 5

Top 5 best Web Security testing tools 2019
Best automated tools for developers and security testers to test security issues in web applications

With increase is cyber attacks, the biggest worry for every developer is security. And that’s the reason web security testing tools exist. Web applications are one of the favorite targets of cybercriminals. From individuals to business firms, security threats are everywhere. There is a saying that Nothing is 100% secure But security professionals try to […]

Hackers exploit 0Day vulnerability in WhatsApp to transfer spyware | CVE-2019-3568
Hacking and Infosec Tech News Technology

Hackers exploit 0Day vulnerability in WhatsApp to transfer spyware | CVE-2019-3568
WhatsApp suffers a remote code execution vulnerability, which allows hackers to exploit WhatsApp users through a phone call - CVE-2019-3568

WhatsApp is the most popular messaging application claims to be the most secure social media platform. It was considered the most secure platform due to the variation of encryptions. Not only encryptions but also the security layers it uses to protect the users. But someone quoted a really beautiful line regarding security: “Every new security […]

What is Termux
Hacking and Infosec

What is Termux? Installation, Usage and 5 best hacking tools for termux
A detailed guide about Termux answering all questions about installation, usage, doing hacking, best hacking tools for termux

There are some most frequently asked questions we often encounter. How to use Android for hacking? What is the best app for hacking on android? The answer to these queries is Termux. But there are a lot of misconceptions about this application. Many of us think termux turns the android into a hack machine. Well, […]

Password Stealing
Ethical Hacking Hacking and Infosec

Password Stealing: How hackers steal email/social media passwords?

We’ve so far discussed the login process, and how the passwords are stored. We’ve also touched a little bit about types of access and definition of unauthorized access. Now let’s move further. And look at some ways of gaining unauthorized access over a targeted user/system. Such access depends on particular circumstances. Maybe it’s a developer’s […]