Ransomware: Cyber-hijacking Malware now has a new deadly face

Everything formidable is often associated with its negative half and the same can be said of the internet. The origins of functional internet can be traced back to the 1990’s, the exact period of the origins of the early form of malware. Malware was then just a few lines of code in software that would […]

List of Known Issues in Windows 10 Preview for Phones and Workarounds

Today Microsoft released the very first build of Windows 10 Technical preview for phones. Just like the other previews, it is incomplete and lacks many features. If you are keen to try out some new features before everybody else, you can download the preview by becoming an Insider at Windows Insider Program. As I mentioned […]

Critical Vulnerability Allows attacker to have full control over LG Smartphones

Search-Lab Ltd. discovered a serious security vulnerability in the On Screen Phone protocol used by LG Smart Phones. A malicious attacker is able to bypass the authentication phase of the network communication, and thus establish a connection to the On Screen Phone application without the owner’s knowledge or consent. Once connected, the attacker could have […]

How to Convert Audio or Video Files to Any Format Using VLC?

You can’t deny the fact that sometimes converting audio and video to some other format becomes one heck of a task. We use different software to do the job and frankly speaking they do it diligently. The worst part comes at the time of installing these free software. They ask to install different kinds of […]

DEA Making Huge Photo Database of Country’s Drivers, vehicles’ number plates

DEA Maintaining Massive database of the country’s drivers and vehicles’ number plates – Database is used by DEA to track car owners. In the recent past reports about the United States Drugs Enforcement Administration’s (DEA) huge database of the country’s every driver and number plate under the alibi of Freedom of Information Act (FOIA) have already […]

Hackers target Forbes visitors through chained Flash and IE Zero-days vulnerabilities

Hackers pieced together zero-day vulnerabilities in Flash and Internet Explorer 9+ to attack financial services and defense contractor employees visiting Forbes.com, according to security firm researchers, Invincea and iSIGHT Partners. In November 2014, the site’s Thought of the Day (ToTD) page, which is displayed briefly upon visiting the site, was compromised. On first visit to […]

How to Use TileArt App for Windows Phone?

  The TileArt app for Windows Phone takes phone customization to a whole new level. See these incredible parallax effects come to life as you scroll through one of the amazing pre-loaded themes created just for you. You can even design themes for yourself. Download the app here – http://lumia.ms/1F1DGJx   Stay tuned for latest technology […]

Microsoft Imagine Cup: A Global Student Technology Competition

Every year for the last 12 years, the Microsoft Imagine Cup has driven young, bright minds from all over the globe to help resolve some of the world’s toughest challenges. All the innovative projects pitched for this competition stay true to the theme “Imagine a world where technology helps solve the toughest problems”. Students from all […]

Researcher publishes 10 million passwords, usernames amid FBI raid

A security researcher has revealed from a research of various data breaches, a collection of 10 million usernames and passwords. The leaked database dumps that had the 10 million usernames and passwords were already available to the public online. But a popular security consultant, Mark Burnett – the person involved in the collecting and researching […]

Kali Linux 1.1.0 Released! Download Now

The developers at Offensive Security are back with yet another great version of Debian-derived Linux distribution Kali Linux version 1.10.  Kali Linux 1.1.0 was released two days ago with additional features with a mix of unprecedented hardware support and rock solid stability. It runs of a 3.18 kernel, specially developed for wireless infection attacks. Here is a complete […]

Samsung’s Smart TV may be Spying on YOU!

Samsung decision to process voice commands in its latest Smart TV through cloud server has sparked a new debate on data retention, according to the daily The Register. According to the term and conditions of the new Smart TV, it is clear that everything said in the presence of the TV range gets transmitted to […]

Hacker gets 8 Years in Jail for Making Prank Death Threats

Remote Control Virus was used by the Hacker to Penetrate into Computer Systems and issue death threats to users. On Wednesday, the 32 year-old Yusuke Katayama, a Japanese hacker, was sentenced to 8 years in prison for using his computer skills to compromise the computer systems of innocent people and issuing death threats. Katayama is […]