The 6 best and the top laptops for any programmer, cybersecurity/hacker, gamer to purchase in 2020. Starting from the lowest to the great budget laptops.Here are all of them
All posts sorted in descending order by date
So this weekend, I participated in a CTF challenge that was organized by GirlScript Goa. It was among the beginner level CTFs, so I was able to solve all but one problem. Nonetheless, I came in 3rd in this and here is my writeup for the solutions of the challenges that I solved. Miscellaneous Challenges […]
Don’t let ANYONE else use your charger. Researchers at Tencent lab has found malware and named it BadPower than can potentially melt or blast your phone by just charging.
The second phase of ethical hacking and penetration testing involves two terms that are Vulnerability Scanning and Enumeration. Scanning involves taking the knowledge discovered during reconnaissance and using it to look at the network
Twitter accounts of top profiles like Bill Gates, Jeff Bezos, Elon Musk and many others got compromised due to a massive security breach and made people to lose over couple of thousand dollars in the form of bitcoin
An undetectable malware with capability to steal SMS to bypass OTP and buy premium service subscription and drain the victim’s wallet. 17k such apps removed so far.
Google has released an Open Source Web Vulnerability Scanner “Tsunami” which automates a lot of tasks for networks with thousands of devices.
Maze Ransomware attack on NHAI India, leaking 2gb of worth zipped sensitive data over dark web, confirmed and analyzed by Cyble (threat researcher firm).
Sony has again confirmed to launch its next-gen of PlayStation which is going to be PS5. Click to read more about the new features, specs, price detail and a lot more.