How To Google Search In Command Line Using Googler Google Search In Command Line Using Googler Short Bytes: Googler allows you to use Google search in the Linux command line. This Linux command…
SpyNote Android Trojan Builder Leaked Is Now Widely Available On The Dark Web Palo Alto Networks’ Unit 42 team recently discovered a new Android Trojan called SpyNote which facilitates remote spying.Unit 42 discovered the Troj…
UBER Payment Design Flaw Let User To Get Unlimited Uber Ride For Free Without Any Vouchers Recent merger of Uber and paytm allow cab user to pay the uber taxi bill using the paytm wallet.With this merger,uber user can book taxi using paytm…
BadTunnel: A vulnerability all Windows users need to patch A security researcher has uncovered a serious vulnerability that affects every version of Microsoft’s Windows operating system from Windows 95 …
BitTorrent Forum Hacked; Change your Password Immediately If you are a torrent lover and have registered on BitTorrent community forum website, then you may have had your personal details compromise…
Bitcoin Creator Has Finally Unmasked Himself. Maybe, Real? The mysterious creator of the BITCOIN digital cryptocurrency seems to have been identified as an Australian entrepreneur, and his name is: Cra…
Apple recovers $40 million worth of gold by recycling old iPhones/iPads Apple’s recycling efforts yield $40 million worth of gold from old devices You probably know that Apple uses gold in manufacture of iPhones. What yo…
How To Build Your Own Rogue Gsm Station And Capture|Sniff All Gsm Traffic In this blog post I'm going to explain how to create a portable GSM BTS which can be used either to create a private ( and vendor free! ) GSM n…