Getting Started With Docker – Docker Ecosystem And Terminologies (Part -2)

Short Bytes: Docker images, Docker containers, Docker Hub, Compose, Machine, Swarm etc. are frequently used terms when working with Docker. In this article, we will be explaining you various terminologies used with Docker Ecosystem to help you get started with next step. In getting started with Docker – Part-1, we outlined the fundamental concepts of Linux containers […]

Must Have Apps for Apple Watch OS 2

Short Bytes: We have made a short collection of the compatible apps that give a sense of what’s possible with the new Apple Watch OS. With the initial launch of Apple Watch OS, Apple had not given access to the watch’s integral parts: its sensors and its face to the third party app developers. Hence […]

Learn to Code: Best Places to Learn C and C++ Programming Languages

Short Bytes: Want to learn to code in C and C++? Read our guide to know about the best places to learn these languages and improve your skill set. In his famous lost interview, Steve Jobs said, “I think everybody in this country should learn how to program a computer because it teaches you how […]

IQ Testing App infected One Million Android devices with Malware

Now you cannot test your IQ without getting your mobile compromised — The malicious new Android app has already infected more than 1 million users —This sinister app is available at Google Play Store and easily evades detection.   The Brain Test Android app available at Google’s Play Store is not your regular IQ testing utility […]

Porn sites hit by malware hidden in adverts

Security firm Malwarebytes says a campaign of malware hidden inside online ads which hit search engine Yahoo earlier this year has now also appeared on adult websites. The advertising, apparently for a service called Sex Messenger, also contained tools for identifying whether the user was genuine rather than a bot. It appeared on porn site […]

Kovter Malware Now Lives Solely in the Windows Registry

Symantec’s researchers have discovered a new version of the Kovter trojan, which now mimics the Poweliks malware and is able to live on your computer’s registry, without needing to be stored on your hard drive. Kovter, first spotted in 2013, has been one of the most updated malware families around, constantly changing its MO, adapting […]

New malware infects ATMs, dispenses cash on command

The GreenDispenser malware displays an error on the infected ATMs so that only criminals can use them. Security researchers have discovered a new malware program that infects automated teller machines (ATMs) and allows attackers to extract cash on command. The program is dubbed GreenDispenser and was detected in Mexico. However, it’s only a matter of […]

Lenovo Laptops and Computers Come with Pre-Installed Spyware

Lenovo has been caught, yet again, installing apps on its laptops and workstations without the user’s consent or knowledge, as Michael Horowitz from Computerworld reports. This is not the first time Lenovo has done this, as earlier this year, in February, security experts found that the company installed the Superfish Visual Discovery software on PCs, […]

Cisco Patches Denial-of-Service, Bypass Vulnerabilities in IOS

Cisco pushed out on Wednesday its usual semiannual round of patches for IOS, the software the company uses for most of its routers and switches. This month’s security advisories addressed four vulnerabilities, three which could lead to denial of service situations, and another that could have let an attacker bypass user authentication. The bypass vulnerability […]

‘RipSec’ goes to Hollywood: how the iCloud celeb hack happened

TV starlet offers iCloud access, photoshopped nudes, to bait voyeur hackers. The chief hacker behind the infamous iCloud celebrity hacks has revealed in a documentary how the group dubbed RipSec shook Hollywood by plundering thousands of naked photos and financial data of Tinsel Town icons. The hacker broke silence and spoke to Canadian tech and […]

Popular Android Games Hit By Malware

The IT security researchers at ESET detected malware on popular Android games which created quite a furor among users. A couple of weeks ago we reported how the hackers are infectiting verified Android apps with malware and successfully passes through Google Bouncer, the vetting system of Google Play Store. Now, ESET reports that the malware […]

Apple Tells the 25 Most Popular XcodeGhost Infected iOS Apps

Short Bytes: Today, Apple has released a list of the 25 most popular XcodeGhost infected iOS apps. The tech company tells the users to update these apps right now. Just a couple of days ago, Apple released a statement in the wake of the new XcodeGhost episode and told how this malware infects the applications. […]

How BIG is Google, Really?

Short Bytes: Google is synonymous with the Internet today, and the word in itself has become a verb. So what made Google popular and the brand that it is now? How Big is Google? Read the article to know more. Just after a few years of being a mere startup in 1997, Google literally burst […]

Hey Scandos, missed that parcel? Here’s some ransomware instead

Variant of CryptoLocker makes an unwelcome appearance. Spam emails disguised as messages from local post offices – but actually packing the latest variant of the CryptoLocker ransomware – are being flung at surfers in Scandinavia. Heimdal Security reports that emails referring to an undelivered package and written in local languages are actually attempts to trick […]

Chinese promotion company hijacks Android devices around the world

A Chinese mobile app promotion company has created malicious adware that allows them to gain complete control of users’ Android devices. The company misuses this access to make the phones download additional apps and to show ads. Naturally, they get paid for installing these apps and promoting a variety of services. As their adware is […]

An Introduction to Hardware Hacking: the RIPE Atlas probe

RIPE NCC is building the largest Internet measurement network ever made. RIPE Atlas employs a global network of probes that measure Internet connectivity and reachability, providing an unprecedented understanding of the state of the Internet in real time. RIPE provide anyone who is interested with a probe that can be connected to a network and […]

Fingerprints of over 5.6 Million Americans Stolen During the OPM Hack

The data breach at the US Office of Personnel Management (OPM) is slowly shaping up to be one of the biggest hacks in the country’s history, the Department of Defense (DoD) revealing that, besides the personal information of over 21 million American government officials, the hackers might have gotten their hands on fingerprint records for […]

Security wares like Kaspersky AV can make you more vulnerable to attacks

Antivirus applications and other security software are supposed to make users more secure, but a growing body of research shows that in some cases, they can open people to hacks they otherwise wouldn’t be vulnerable to. The latest example is antivirus and security software from Kaspersky Lab. Tavis Ormandy, a member of Google’s Project Zero […]

Your iOS 9 Lockscreen Can Be Bypassed in 30 Seconds

A security flaw has been discovered in Apple’s mobile software iOS 9 that lets strangers exploit Siri in order to bypass lock screen on the latest Apple’s mobile operating system and gain access to contacts and photos stored in the device within 30 seconds. Apple iOS is believed to be one of the most secure […]