Open Source Privacy Tools that Keeps you Safe from NSA
After the Gemalto security breach it is clear that Spy agencies like NSA use their Hackers to gain access to servers. Snowden documents showed that NSA goes beyond legal boundaries to keep an eye on the people at the name of National security. These security breaches by Spy agencies will never gonna stop. So it […]
Exploiting Android Device with Metasploit in Kali Linux
Mobile users are everywhere, regardless knowing the technicalities everyone, everywhere are using mobile phones. Android is the most famous mobile operating so far and at the same time it is also vulnerable to many exploits and bugs. Infosec professionals have previously warn about the security and in the recent year we have also seen many […]