Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the crayon-syntax-highlighter domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the otw_dcsw domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/ktech37/public_html/wp-includes/functions.php on line 6114
Vulnerabilities Archives » KryptosTechnology

Vulnerabilities

new advanced phishing attack targeting chrome browser

New Advanced Phishing Attack targeting chrome browser for Android.

Hackers are now launching new sophisticated phishing attack on android chrome web browser. Which let the attacker hide the original address bar screen space by displaying there own fake URL bar when scrolling down on the web page. Cyber Security researcher by the name James Fisher has recently demonstrated a new phishing attack method by […]

New Advanced Phishing Attack targeting chrome browser for Android. Read More »

Android Antivirus Apps Are fake and Ineffective

Android Antivirus Apps Are fake and Ineffective to a virus.

Antivirus app most commonly uses by android user turn out to be fake base of research carried out and published by an Austrian antivirus-testing lab which declares that most of the antivirus apps are fake, ineffective and unsafe for your android device. Group of researchers at the AV-Comparatives which is an anti-virus testing lab conduct

Android Antivirus Apps Are fake and Ineffective to a virus. Read More »

hackers are tapping in phone network using ss7 exploit

Hackers are tapping in phone network using SS7 Exploit to empty bank accounts.

Hackers are now using a sophisticated method to tap in Phone network by exploiting the SS7 protocol to steal money from bank accounts by intercepting the message that has been sent to the trusted phone number. he SS7 protocol which standards for Signalling System No. 7 which internet service providers and telecom companies use to

Hackers are tapping in phone network using SS7 Exploit to empty bank accounts. Read More »

IPhone X, Samsung Galaxy S9, Xiaomi Mi 6 Hacked at Pwn20wn Tokyo 2018

IPhone x, Samsung Galaxy S9, Xiaomi MI 6, Hacked at pwn20wn Tokyo 2018 Event he Annual Hacking contest which goes by the name of Pwn20wn which was held at the PacSec Security conference in Tokyo, which hackers showcase their skills by successfully exploiting the iPhone X Samsung Galaxy s9, Xiaomi Mi6, Google Pixel 2, Huawei P20 and

IPhone X, Samsung Galaxy S9, Xiaomi Mi 6 Hacked at Pwn20wn Tokyo 2018 Read More »

ios webkit attack

IOS Webkit attack crashes, restart IPhones, iPad’s & freeze macOS

A new CSS-Based Ios webkit attack can crash your iPhones or Ipads and freeze your Mac Computer System. This will affect only Apple iPhones, iPads and Mac computer, this bug, however; doesn’t affect users which uses Windows or Linux. security researcher at Wire,  the instant encrypted messages app wire, tweeted on Twitter  on Saturday about his IOS Webkit

IOS Webkit attack crashes, restart IPhones, iPad’s & freeze macOS Read More »

Telegram Zero-Day Exploited by Hackers to Mine Cryptocurrencies

The flaw has actively been exploited in the wild since at least March 2017 by attackers who tricked victims into downloading malicious software onto their PCs that used their CPU power to mine cryptocurrencies or serve as a backdoor for attackers to remotely control the affected machine, according to a blogpost on Securelist. Here’s How

Telegram Zero-Day Exploited by Hackers to Mine Cryptocurrencies Read More »