In: Information Security

We cover information security news and tutorials. Learn all about cyber security with the help of articles written by experts in cyber security and information security.

5 critical vulnerabilities affecting Foxit Reader & PhantomPDF; patch them now

A team of specialists from a cyber security audit company revealed the finding of at least five flaws in Foxit…

The biggest Linux kernel update is released; version 5.8 removes racist jargon such as “master” or “slave”

After much anticipation, Linus Torvalds has finally announced the new main line of Linux Kernel 5.8. According to network security…

Privilege escalation flaw in VMware Tanzu & remote code execution flaw in VMware GemFire

Exploit development training specialists have reported the finding of a couple vulnerabilities in some products developed by VMware, a company…

Samsung-LG-Smart-TV-hack
How to easily hack your Smart TV : Samsung and LG
How to easily hack your Smart TV : Samsung and LG Originally called “connected TVs,” and now they are called...
satellite hacking
How to hack & Intercept Satellite Communication
How to hack and Intercept Satellite Communication In today’s world we use satellite communication in many industries and we all...
satellite jamming
How to do satellite interference or jamming from satellites
How to do satellite jamming Satellite jamming is a kind of censorship, whereby the government, hackers or criminals prohibit access...
Flight satellite and navigation system security
Flight Communication – Navigation system hacks
Flight Communication - Navigation system hacks In our last article over In-flight entertainment system we talked about In-flight entertainment system...
audio-steganography
How to hide secret messages in music files?
How to hide secret messages in music files? There are many reasons to hide information but the most common one...
port scaning
How to scan whole Internet 3.7 billion IP addresses in few minutes?
How to scan whole Internet 3.7 billion IP addresses in few minutes? Cyber security audit and ethical hacking training professionals...
election hacking and interferance
How to influence the electoral processes and hack government elections?
How to influence the electoral processes and hack government elections? We all know that media and information technologies play an...