Tor has hired a former Electronic Frontier Foundation (EFF) executive director to lead its project that is aimed for making the cyber...
Researchers are still looking for a Tor alternative.Scientists at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) have created an anonymous...
Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. Experts at FireEye have discovered...
MIT researchers claim they have developed “Vuvuzela” SMS Text Messaging System which is way more secure than Tor and provides guaranteed untraceable communication....
THE TOR PROJECT is entering a crucial phase in its nearly 10-year existence. In the wake of the Edward Snowden leaks, it...
Meet Jeff Becker and his creation: git.psi.i2p. Lots of people seek anonymity these days, for various reasons, may it be because of abusive...
BugSec Group and Cynet discovered a severe vulnerability in Next Generation Firewalls. Head of Offensive Security Stas Volfus uncovered the vulnerability, code-named...
Tech expert warns that ‘smart toys’ could be hacked in to under powers being proposed in draft Investigatory Powers Bill. Britain’s intelligence...
Cyber-espionage group targeted companies in Asia. Details about the operations of a new cyber-espionage group are emerging, and this gang has been buying...
Introduction Zscaler ThreatLabZ has been closely monitoring a new Spy Banker Trojan campaign that has been targeting Portuguese-speaking users in Brazil. The...
FBI director James Comey called on tech companies to create backdoor access to their users’ data on Wednesday, arguing it was necessary...
MALVERTISING IS WHEN hackers buy ad space on a legitimate website, and, as the name suggests, upload malicious advertisements designed to hack...
NSA’s one of the known snooping tactics is installing a malware into hard drive’s firmware which makes the deletion of the malware...
EVEN AS HIS face towered 10 feet above the crowd at the Bitcoin Investor’s Conference in Las Vegas, Craig Steven Wright was,...
After hacking nuclear plants, Refrigerator, House Arrest Ankle Bracelet, Smartphones GPS Signals, Electronic Skateboards, Driverless Cars, Jeep, Computer Controlled Sniper Rifle and Jeep Cherokee etc, it is now time...
Social engineering is a pretty important item in a hacker’s toolkit.in Mr robot there was a time, we see Elliot, using social...
On September 11, 2015 I visited Media Markt in Utrecht Hoog Catherijne, a well-known electronics shop in The Netherlands. Since summer 2014, the biggest independent Dutch...
Today at JSConf US Last Call in Florida, we announced that we will open-source the core components of Chakra as ChakraCore, which...
Bootkit targeting banks and payment card processors hard to detect and remove. Malware targeting banks, payment card processors, and other financial services...
People who download stuff from torrents and other cracked software providing websites have a very bad news because a user recently downloaded...
Proposed French Law Would Ban TOR In Response to Paris Terror Attacks France is looking to tighten its censorship laws after the...