How To Save Instagram Photos To Your Mobile And Desktop

Just like WhatsApp, Instagram’s acquisition was one of the most wise decisions made by Facebook. Instagram is one of most used photography apps and I know it’s one your favorite apps for photo sharing. Based on a user request, today I’m sharing something related to Instagram and how to use it to the fullest. There […]

Iran Ministry of Defense Website Hacked by Saudi Hacker

Saudi Arabia along with its allies is fighting a war in Yemen while their hackers are fighting an online war against Iran, accusing the country of supporting Houthi forces. A Saudi hacker going with the handle of RxR HaCker hacked and defaced the official website of Iranian Ministry of Defense, Thursday night. The targeted domain belongs to Gozinesh […]

US based Company lost $3.8 million stolen due to cyberattack

Due to a cyberattack an Alaska Native Corporation had to bear the loss of $3.8million which the firm was transferring to a Hong Kong based bank account last month. CEO Greg Hambright of the Kodiak-based Afognak Native Corp explained to the group’s 900 shareholders in a letter that one of its affiliates Alutiiq LLC was […]

Police can Grab cell phone records without Warrant, Court Rules

Federal Appeals Court rules that citizens shouldn’t have any “expectation of privacy” when a third-party firm has access to data as sensitive as cell phone records. The United States Court of Appeals in its recent session decided that police will not have to show a warrant in order to collect cell phone records from carriers. […]

Ubuntu 15.10 Codename Finally Announced: Wily Werewolf

If you are Linux enthusiast, you would be aware of the fact that a new Ubuntu release is soon followed by the announcement of the codename of next release. Earlier this week, Canonical founder Mark Shuttleworth announced the codename of the Ubuntu 15.10 release and it’s ‘Wily Werewolf.’ Ubuntu codenames its versions with two words […]

Now Color-Blind people can View Web– Thanks to New Chrome Extension

New Google Chrome extension helps color-blind users surf Internet without any problem. To pass the leisurely time, the Internet isn’t always one of the first choices of color-blind people. In fact, for color-blind people using the Internet becomes highly irritating as they aren’t even able to see logos properly. However, Google has identified a way to fill in […]

Lenovo accused of ‘massive security risk’ by researchers

The IOActive researchers reported that Lenovo devices software has serious security flaws and vulnerabilities that can be easily exploited by cyber criminals for installing malware. Globally active Chinese PC manufacturer Lenovo has been accused by researchers for running a “massive security risk” when experts identified exploitable flaws in its software. Reportedly, security Firm IOActive’s researchers […]

Is online voting a security risk?

The world is moving online and so too now is politics. But as online, electronic voting (e-voting) increasingly becomes reality, are we opening ourselves up to vote rigging by power-hungry politicians or fame-seeking hackers?

Google Says Ad Injecting Malware Affecting Millions of Users

Google’s recent study shows the effect of the Ad Injection in our digital media. We already know and hate the ad frauds, ad blockers, and ads that aren’t viewable. Now this dreadful list is extended with one new component for scammers to earn revenue from the internet users – Ad Injection. In basic terms, it […]

Apple users hit with KYC Validation/iCloud ID review phishing scam

A fake email supposedly sent by ‘Apple Genius Assistance’ informs that users need to review their Apple ID information within 2 days because Apple wants to perform account verification as per “KYC legislation.” Don’t fall for it — It’s a phishing scam. Another day another phishing scam. An email titled Apple KYC Validation has been […]

This New Rombertik Malware Crashes Your PC Once Detected

A complex malware dubbed as Rombertik has been designed to steal user data and comprises of several layers of anti-analysis functionality and obfuscation — Its last check is highly dangerous as it can trigger itself as destruct and destroys all the files stored on the user’s home folder. Hackers are spreading the Rombertik malware through […]

Snowden documents show how NSA converts Audio calls into searchable data

A new Edward Snowden document released by The Intercept describes the way NSA converted voice calls into searchable text files for about a decade.  In a new document released by The Intercept from the cache of government files possessed by Edward Snowden has exposed how the National Security Agency (NSA) has been converting audio calls […]

New iPhone case charges your phone battery without being plugged in

Nikola Labs has launched an iPhone case that transforms radio frequencies into DC electrical current and thus, can charge devices. The first device running on this mechanism is a case for iPhone 6. It doesn’t require extra battery though and works passively. What if your smartphone case was able to harvest electricity right out of the […]