Short Bytes: In this article, I’m going to share how someone made a “PiPhone”. Well, as the name suggests, PiPhone is a...
Apple’s App Store in China has apparently been penetrated by Hackers which experts say has placed the devices of hundreds of millions...
Linguistics and some form of textual analysis can be helpful in analysing malware and scams. Regional attribution, though, still requires caution.
Short Bytes: What if you had to study one single page to get the complete idea of a programming language? In this...
Security researchers at VerSprite have tested and discovered a few vulnerabilities in Western Digital’s My Cloud NAS (Network Attached Storage) hard drive,...
A new piece of adware that serves as an entry point for future trojan infections was discovered by Dr.Web security researchers. This...
China’s “Great Firewall” may have been partly to blame for the first major attack on Apple Inc’s (AAPL.O) App Store, but experts...
We at ESET recently discovered an interesting stealth attack on Android users, an app that is a regular game but with one...
United States Air Force at the Air and Space conference held in Maryland, has unveiled a specifically designed aircraft named EC-130H Compass Call that...
The proliferation of independent and vendor-sponsored bug bounties has not only put some money in researchers’ pockets, but has also forced enterprises—and...
Edward Snowden claims that if the technology keeps on becoming sophisticated and flawless then we may never be able to locate aliens...
Here’s a treat for hackers and security researchers who don’t mind selling information about zero-day vulnerabilities to the highest bidder: Zerodium, the...
Short Bytes: Security firm Zerodium has launched “The Million Dollar iOS 9 Bug Bounty”, that offers $1 million for finding vulnerabilities and...
Govt mulls a policy that requires users to save messages, and hand them over to law enforcement agencies, if asked. Deleting WhatsApp...
Adobe has released a Flash Player update that addresses 23 critical vulnerabilities in the software, many which can lead to code execution....
Cryptowall attackers are smashing businesses in the Australian state of Queensland, according to the owner of a Townsville sex shop which has...
The Ghost Push malware comes with those Android apps that are available at non-Google app stores. The newly discovered Android malware dubbed as Ghost Push Malware has...
New Android malware was discovered, able to steal money from online banking accounts, and hide SMS notifications coming to confirm financial transactions....
Short Bytes: It’s reported that scammers are taking advantage of Facebook Dislike button anticipation and they’re using the Facebook users. These scams trick...
After two weeks of sharp, last minute changes in the Bitcoin price, the markets caught a break this week, with the price...
Short Bytes: The government of India doesn’t understand the concept of online privacy and the importance of encryption. A new government body...