Federal Appeals Court rules that citizens shouldn’t have any “expectation of privacy” when a third-party firm has access to data as sensitive...
In the recent past, Facebook has brought more power to the users and now they can control all the information they’ve shared...
The mass collection of American phone records and metadata by the National Security Agency (NSA) has been ruled illegal by a US...
If you are Linux enthusiast, you would be aware of the fact that a new Ubuntu release is soon followed by the...
New Google Chrome extension helps color-blind users surf Internet without any problem. To pass the leisurely time, the Internet isn’t always one of the...
A Three-judge panel of the Second Circuit Court of Appeals decided that the telephone metadata collection program of NSA is illegal under...
The IOActive researchers reported that Lenovo devices software has serious security flaws and vulnerabilities that can be easily exploited by cyber criminals...
The world is moving online and so too now is politics. But as online, electronic voting (e-voting) increasingly becomes reality, are we...
In this recorded webinar the security challenge that mobile devices and BYOD bring to the businesses, notably smaller businesses, is reviewed; then...
Not only is Brazil one of the most populated countries in the world, but it is also one of the countries with...
Google’s recent study shows the effect of the Ad Injection in our digital media. We already know and hate the ad frauds,...
A fake email supposedly sent by ‘Apple Genius Assistance’ informs that users need to review their Apple ID information within 2 days...
A complex malware dubbed as Rombertik has been designed to steal user data and comprises of several layers of anti-analysis functionality and...
A new Edward Snowden document released by The Intercept describes the way NSA converted voice calls into searchable text files for about...
Concern over the security of Windows in China has led to a 'gold rush', as Chinese firms race to fill the gap...
Researchers have uncovered a new malware which will try to 'destroy' the computer, reports Cisco. Let's understand how it really is.
Nikola Labs has launched an iPhone case that transforms radio frequencies into DC electrical current and thus, can charge devices. The first device...
Two researchers surprised people by demonstrating how they could carry out a denial of service (DoS) attack on iOS devices.
Cyber criminals and security researchers face each other each day in a never ending battle. Both are two sides of a single...
An Australian man facing 25 hacking charges has fled to Europe, ahead of being trialled for attacks which targeted major computer firms.
GitHub, the web-based Git repository hosting service is down right now and Turkish hackers from Turk Hack Team claim they are behind this attack....