Short Bytes: The FCC is on the receiving end over its proposed rules to alter WiFi routers to make them secure as...
Facebook is a great platform for those who are looking for new friends, finding old ones or to promote their business. In...
UltraDNS, a web content delivery service, went down Thursday afternoon, taking with it a number of popular websites, including Netflix and Expedia....
Short Bytes: In 2015, the infamous spyware FinFisher is spread in 32 countries to perform advanced citizen surveillance. Citizen Lab, a security watchdog,...
HTTP Strict Transport Security (HSTS) was designed to help secure websites (those using HTTPS) by declaring to web browsers that they should...
Short Byte: In a bizarre incident, Facebook users are reportedly seeing increasing friend suggestions of the people they have dated before through...
Short Bytes: Flying cars dream would soon change into a reality. So, get ready and pick your ride in advance. Good luck...
Developers at Automattic, the parent company behind the blogging platform WordPress, fixed a nasty stored cross-site scripting error this week in Akismet,...
A banking trojan, detected by ESET as Win32/Brolux.A, is targeting Japanese internet banking users and spreading through at least two vulnerabilities: a...
Researchers show how mass decryption is well within the NSA’s $11 billion budget. For years, privacy advocates have pushed developers of websites,...
Hacking SIRI and Google Now silently from 16feet away now possible via Headphones, claim ANSSI Researchers. French researchers at the government’s information...
Extremely secretive spy vehicles equipped with X-ray facility, Z Backscatter, will now be seen patrolling the city streets — NYPD hasn’t disclosed...
For a Facebook marketer, the most important statistic is how many people have viewed their post and although Facebook provides details regarding...
Short Bytes: Visual Hacking is a security threat that is often overlooked by us. This is the act of stealing information by...
Short Bytes: EMV credit cards have till now been assumed to be unhackable. The security professor from the University of California explains how...
You may be under the impression that the new EMV chip system for credit card payments is nice and secure. But the...
Over the years, the McAfee Labs team has worked with IT security vendors, law enforcement and others to identify and evaluate numerous...
Sooner or later you are going to have to address the Flash problem on your computers. And there doesn't seem a better...
Short Bytes: Continuing our “steps to effective security” series, we are here with a true story that tells about the basic security...
Cyber security audit and ethical hacking training professionals normally use scanner to scans the networks. Scanning every IP address on the internet...