Tor would soon be launching a bounty program which would reward any person who finds a vulnerability in one of the most...
It is possible to prevent encryption keys from reaching Microsoft’s Servers – Learn how: It is a known fact that for all...
Social engineering plays an important part in a significant number of cyberattacks, however big, small or sophisticated the crime is. However, little...
Palo Alto Networks unravels ‘BackStab’ technique which allows criminals to get access and steal your private data, via unprotected phone backups. The security...
North Korea’s homegrown computer operating system mirrors its political one – marked by a high degree of paranoia and invasive snooping on...
Image | fossBytes Short Bytes: OS.js is a free and open source operating system that runs in your web browser. Based on...
Here at Gadget Hacks, we spend countless hours scouring the web to find the most interesting apps as they make their debuts,...
It doesn’t require you to buy a new copy of Windows. As happens from time to time, somebody has spotted a feature...
Radamant ransomware v1 and v2 are now decryptable. Fabian Wosar, security researcher at Emsisoft, has managed to crack the encryption algorithm for the...
Palo Alto Networks researchers have identified a unique malware that infects home PCs and transforms them into internet proxies using HTTP tunnel....
Simple DNS hijacking enables attackers to distribute Fake Infected Flash Player at UConn website. On Sunday, the official web portal of the...
Android Malware poses as Google app to infect Android Devices and to Block Security Apps. Recently, security researchers at Symantec Corp identified...
On Christmas Day Caltrans Freeway sign in Corona Displayed Especial Message for Donald Trump. On Christmas Day, Caltrans Freeway sign in Corona...
Researchers could not track down the database’s owner.Security researcher Chris Vickery has identified a misconfigured database that contains the personal details of...
An employee of Russia’s Internet giant Yandex, Dmitry Korobov, stole the source code of its search engine and tried to sell it...
Experts at Symantec discovered that hackers quickly take advantage of CVE-2015-8562 remote code execution to compromise Joomla servers. Joomla recently patched the CVE-2015-8562...
Short Bytes: Anonymous hacktivist group has claimed to block a possible ISIS terror attack on Italy. While Anonymous hasn’t released any evidence to...
Short Bytes: Recently an open US voter database leak was discovered by Chris Vickery, a white hat hacker. This database contains information...
Short Bytes: Here is a list of 25 best android Antivirus that were put on test by AVTest, a company specialized in...
Stealing PINs and pillaging bank accounts are both trivial. Credit card users could have their PINs stolen, and merchants could have their bank...