WikiLeaks Exposes NSA’s Addiction of Eavesdropping on Its Friends

A new assortment of documents have been released by WikiLeaks revealing National Security Agency has been spying on its German associates who are solely responsible for economics, commerce, finance and agriculture sector of the country. The documents, named as “The Euro Intercepts”, comprises of a list of phone numbers of German public officials and ministers who […]

Google Image Recognition Software Tags Black Couple as Gorillas

Google Apologizes after its Image Recognition Software Mistakenly Tags Black couple as Gorillas. A computer programmer Jacky Alcine saw his and a friend’s images labeled as “gorillas” in an album on Google Photos.  The search engine giant explains that the mislabeling occurred due to a fault in its image recognition software. Google reportedly, is “appalled” […]

Donald Trump Hotels Face Major Credit Card Breach as Hackers Target the Empire

The meltdown of Donald Trump’s empire is slowly but continuously gaining momentum and the latest to add more misery to the real estate mogul’s already swelled up problems is the hack attack. Reportedly, the Trump chain of hotels has become the victim of latest hack attack by cybercriminals and a major credit card breach has […]

A Guide to become an Ethical Hacker

A person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent. So if you want to be an ethical hacker the truth is there is no easy method to become a skilled hacker…… it’s easy to be a script kiddie and load up Armitage […]

Protect your Pendrive with Password

Everyone now a days has one or two additional pendrives and hard disks with them because pendrive makes sharing of data very easy and fast. You can share large files very easily because downloading the same file from the internet would take a very long time and also utilize our data. So instead, we prefer […]

Armenian Hackers Leak ID Cards, Passports of 5k Azerbaijani Citizens

The cyber war between Armenians and Azerbaijani hackers is never ending. Just like today when Armenian hackers leaked trove of data containing personal information of Azerbaijani citizens. Armenian hackers from Monte Melkonian Cyber Army hacked into the official website of Azerbaijani customs, stealing highly confidential personal information of 5650 Azerbaijani citizens. One part of the leaked data […]

Get A Refund on Google Play Store Apps

Every Android mobile has Google Play Store pre-installed on its device. Play Store is an awesome market to download some awesome applications and games for our phones. It has millions of apps some of which are free and some are paid. Free apps are very good, but they show a lot of ads which may […]

Microsoft Joins the Linux Foundation’s R Consortium Along With Others

Today the Linux Foundation announced a new initiative called R Consortium-  a group to unite the users of the open-source R programming language. Microsoft announced that it is joining it along with Google and more as a founding member. Apart from Microsoft and Google, the other founding members are Oracle, HP, Tibcom, RStudio and Alteryx […]

Dino Malware exposed: Found Spying on Iran and Syria

Links traced to “Animal Farm” group and State Sponsored cyber criminals who already have targeted Syrian and Iranian computers in 2013. Bratislava, Slovakia-based security firm ESET’s researchers have identified a very sophisticated Trojan that attacked Iranian and Syrian subjects in 2013 while rumor is that the group is a secret wing of the French Intelligence service. […]

Convert your Facebook profile into a Page

Facebook is the number one social networking website with more than one billion active users. All of us have a Facebook profile and we regularly post some pictures and status on FB. We have facebook profiles, but some people has a Facebook page. Mostly famous people, bands or other interests. Anyone can easily create a […]

How To Access Computer’s Hard Drive With Smartphone

Yes, you heard that right. You can access your computer’s hard drive with your smartphone in few simple steps.  For this, you don’t have to download or install any big software on your PC or  smartphone. Your Android’s file explorer can do the task easily. The good thing with this tutorial is that you can […]

Download whole photo album on Facebook with a single click

Facebook is the No.1 Social Networking website with more than 1.2 Billion active users. Everyone posts images on FB. Whenever we surf our news feeds, we see hundreds of photos and videos and links. Some images are so amazing that we immediately save them. Saving one or two pictures are easy. What if you need […]

Download Torrents with IDM

There may be many reasons to download torrent files using IDM. It may be that you get good speed using IDM, no issue to leech and seed the torrent, best to download small size files. But the question arises How to download torrent files using IDM? IDM can help a user to increase the download […]

Bad News: NSA Resuming US Mass Surveillance for Another 6 Months

If you were busy celebrating the fact that the Patriot Act will bring an end to NSA’s mass surveillance, you should take a minute and wait for another 180 days. The National Security Agency yesterday reported that the federal court has granted it the permission to restart the bulk collection of Americans’ phone call records. […]

Anonymous Shuts Down Canada Spy Agency Website

The online hacktivist Anonymous conducted a massive DDoS attack on the official website of Canadian Security Intelligence Service (CSIS) and forced it to go offline. The attack was conducted against the approval of anti-terror Bill C-51 that provides Canadian Security Intelligence Service (CSIS) immense powers as it can violate digital privacy of any one at any time in the name of […]

Researcher Claims Your Wearable Fitness Trackers Can Be Hacked

Nowadays wearable devices, especially fitness checking devices, are very much in vogue. However, security and technology experts are prompting warnings about the vulnerable nature of these devices to cyber-attacks. According to the estimation of the International Data Corporation/IDC, around 72.1million wearable tracker devices like Samsung Gear, Apple watch, Nike Fuel, Fitbit, and Jawbone will be […]