US Citizens Targeted with Ransomware via Fake IRS Tax Return Emails

Tax Return-themed Emails make Users in America the Target of Ransomware – Attackers sending genuine-looking Internal Revenue Service (IRS) tax refund messages. Today, when the culture of filing tax reports in the United States has come to an end, cybercriminals have instigated their phishing lure and are busy distributing fake emails that appear to be from the […]

University of Toronto Website Hacked by pro-ISIS Hackers

Team System DZ is known for hacking high-profile websites – Their latest target was the University of Toronto and they successfully achieved their goals by leaving pro-ISIS messages on the university’s website. A group of Pro-ISIS hackers from Algeria (going with the handle of “Team System DZ”) hacked and defaced the official mobile website (mobile.utoronto.ca) of […]

WikiLeaks Publishes Searchable Database of 170,000 Hacked Sony Emails

The famous international, non-profit, journalistic organisation WikiLeaks published thousands of hacked Sony Emails. You can now access, read and search all the hacked documents — Sony is not happy about it. On Thursday, WikiLeaks published 170,000 emails and 30,000 documents belonging to Sony Pictures, acquired from world-renowned hack where North Korea was blamed for breaching Sony […]

Hijack Hack: Airplane WiFi Could be Used to Hack Planes

According to a new report, hundreds of commercial planes are vulnerable to hacking due to their very own airplane WiFi network for passengers. The Government Accountability Office has issued a warning that hackers sitting thousand feet below on the ground can gain access of the onboard system computers using plane’s WiFi entertainment system for passengers. It […]

Spying Tools Being Bought Secretly by DEA from an Italian Surveillance Firm

DEA has been a client of the controversial Italian surveillance tech firm Hacking Team since 2012 — DEA has bought spyware capable of intercepting all sorts of communication. The Drug Enforcement Administration (DEA) firstly placed an order in August 2012 and has bought the software called Remote Control System/RCS. This software can intercept telephone conversations, social […]

How to Find Duplicate Files Using Duplicate Files Finder

I am always a victim of lots of useless and redundant data in my PC. Out of all these useless files, a good percentage of the content is the duplicate data. It’s always difficult to find duplicate files and delete them manually. So today I am going to show how can you find the duplicate files […]

Vulnerable In-flight WiFi lets hackers to remotely takeover modern aircraft

The on-plane Wireless systems can easily be hacked by compromising the websites visited by travelers — This happens if same routers/wiring is used for accessing the flight controls and entertainment. Experts suggest it is a security threat that hasn’t been dealt with appropriately! The US Government Accountability Office (GAO) stated in its report that one […]

Anonymous Hacks San Bernardino County Sheriff Support Site Against Police Brutality

Anonymous GhostSec hacktivists have attacked the official support website of John McMahon (mcmahonforsheriff.com), who is a severing Sheriff in the San Bernardino County Police, California. Hackers have left several deface images and messages against the San Bernardino County Police for kicking and punching a man who led deputies on a pursuit in the high desert northeast of Los Angeles Thursday, April 9, 2015. […]

New Android App Lets You Unlock Your Phone with Your Voice

The new “Trusted Voice” Android app allows you to unlock your smartphone with your own voice — No pin, no password, just your voice. Trusted Face app, which detects your authenticity through facial recognition or a Trusted Device connection, already has helped you skip the conventional lock screen. And now, Google has added another smart lock […]

Child Abuse Images Sold by Paedophiles for Bitcoin

Paedophiles reportedly have been trading child sexual abuse images for bitcoin, revealed the Internet Watch Foundation/IWF in its annual report for 2014. The group has been tasked with addressing the problem of child sexual abuse images online and the team identified that the “most prolific commercial” child abuse sites had started accepting digital currency for […]

A CIA Funded Company Reportedly Scanning Chats but Facebook Rejects Claim

Facebook Privacy Debate: A CIA Funded Company Reportedly Scanning Chats but Facebook Rejects the Claim. A developer has claimed on Hacker News that a third-party agency is continuously scanning private chats on Facebook. The developer observed this feature while testing an application that was set up in a non-published area. As a result, unusual activity was […]

Suspects Behind Nazi-loving Android Malware Arrested in Russia

Suspected ‘Nazi’ Android FBI Ransomware Architect Detained In Russia – A Nazi-themed malware control panel was used by the Svpeng cybercriminal gang. It has been announced by Russia’s Ministry of Internal Affairs that a 25-year-old, who was suspected to be the mastermind behind the harmful strain of Android money-stealing malware called Svpeng, has been arrested. Svpeng […]

How secure is your smartwatch?

Last week’s Apple Watch launch has put the spotlight back on the ‘smart’ inter-connected watches that are expected to change how we interact with each other and the internet. But how secure are they?

Chrome 42 Sends Notifications from Web Pages You Have Closed, Download Now

Today Google has launched Chrome 42 for Windows, Linux and Mac. This release can come bundled with new developer tools that will allow developers to create more immersive application for web. Google Chrome is one of the most widely used web browser and in addition, it a big platform that developers need to look at. […]

Apple’s Swift is the Most Loved Programming Language: New Dev Survey

Apple’s Swift, a relatively new programming language introduced to the world at Apple’s 2014 WWDC seems to have become a new favorite among the developers. Just like every year, Stack Overflow conducted its annual survey in which about 26,000 people participated from 157 countries. This survey was conducted to get a better understanding of the […]