New Dislike button scam has started to make rounds on the Facebook, one of the most popular and widely used social media...
Short Bytes: Linux containers (LXC) are very popular these days among developers and companies (perhaps due to Docker, which leverages LXC on the...
Security experts have warned ATM (Automated Teller Machine) users to stay clear from suspicious ATMs for past several years because of numerous...
Short Bytes: Linus Torvalds is the creator of Linux and he still decides what will happen in the world of Linux. Read...
The online hacktivists affiliated to Anonymous, AntiSec and HagashTeam conducted a cyber attack on Vietnamese government websites against online censorship and human...
A unique malware has been found by security experts which spies on the players of online poker gaming sites, specifically Full Tilt...
Short Bytes: Do you want to crash someone’s Google Chrome just for the heck of it? Here’s how to do it with...
Microsoft Windows, in spite of having an insignificant share in the mobile market, is the leading operating system that is responsible for...
BitPay the Atlanta-based Bitcoin payment processor had been hit by a massive phishing attack costing the company $1.8 million. Verified by the...
Sometime yesterday, 17 September, hackers took over the websites of Silicon Valley’s Embarcadero Media Group, publisher of the Palo Alto Weekly, theAlmanac,...
AT&T has filed a lawsuit against 3 former call center employees, accusing them of installing malware on their servers with the purpose...
THE APPLE ECOSYSTEM is well known for very rarely letting any dodgy apps enter it because of the company’s stringent security checks....
The world of computer viruses and antivirus solutions is in a constant change, with cyber-crooks evolving their code and cyber-security firms trying...
A simple mistake by networking gear manufacturer D-Link could have opened the door for costly damage. Private keys used to sign software...
The command line is an interface for typing commands directly to a computer’s operating system. It is usually used to resolve Microsoft...
Short Bytes: The Australian national research agency Data61 has developed an unhackable kernel named seL4 and proved its unhackable property mathematically. The kernel...
No more watery eyes, when you wake up from sleep in the middle of the night to work on your bright computer...
Russian national pleads guilty in global hacking scheme. Russian Hacker Vladimir Drinkman faces 30 years sentence after pleading guilty to hacking NASDAQ,...
A look back at how ransomware – a type of malware used mostly for hijacking user data – has evolved from the...
When you open File Explorer in Windows 10, the system’s default file browsing and management tool, you will notice immediately that it...
Last year, the Washington Post published a story on airport luggage handling that contained unobscured images of the “backdoor” keys of the Transportation...