Short Bytes: The popularity of programming languages is measured using various factors. The TIOBE index is often used as the best way...
Smartphones have taken our lives to a different level, besides helping us to connect with others, they also save lives; just like...
Facebook’s Photo Magic Can Scan Users’ Camera Roll to find Photos of their Friends — We learned about Facebook’s new feature called...
Hackers leak data of over 7,000 officers. Hackers who declined to name themselves hacked the servers of the Brazilian Army, and later leaked...
Distributed via Word files and the Angler EK. Cyber-crooks are diversifying their activities by including as many threats as possible inside their malware-delivery...
CSI: Cyber is known more for absurd drama than technical coherence, but it’s a big deal that hacking’s become so visible that...
Point of sale malware has gotten more sophisticated as we inch closer to the two-year anniversary of the Target data breach. Now,...
Newsweek has revealed that Spotify (One of the giants of the Music industry) faced a hacking attack last week and thousands of...
The US government has started arresting people who are showing support for the so-called Islamic State (IS, previously ISIS/ISIL) on social media. Whether it be...
Short Bytes: A new discovery at the PacSec Conference at Tokyo unveiled a great threat prevailing in the Android OS that hands...
Although it's far from always possible to determine the perpetrators of a denial-of-service attack and bring them to justice, there are plenty...
Vulnerabilities in SAP and Oracle products expose companies to crippling attacks, oil market fraud or equipment sabotage. A talk delivered at the Black...
Edward Snowden has been offering advice on operational security to ordinary people, advocating, among other things, two-factor authentication and encryption.
Car hacking may sound like something out of the latest Die Hard or James Bond film, but it’s newsworthy, real and likely...
Avast confirms the recent Vizio Smart TV snooping scandal Security researchers at Avast have hacked a Vizio smart TV and gained access...
Google’s Chrome staff got in contact with the security researcher and has already started working on a fix A Chinese security researcher...
FEDERAL AUTHORITIES HAVE indicted four men on charges that they hacked into multiple financial institutions and operated a stock-pumping scheme and online...
More than a year ago, the Tor Project patched its software against a vulnerability being exploited by researchers at Carnegie Mellon University,...
One of the Internet’s oldest and crudest attacks experiences a resurgence. A number of sites have been hit by distributed denial-of-service attacks...
If you would like to build your personal private chatting system without any hassle besides entering a different Address in your web...