The American security Agency NSA is infamous for its mass surveillance programs. Every alternate day, we are greeted with new revelations regarding...
International law enforcement agencies have arrested more than 60 people suspected of carrying out cybercrime associated with the Darkode forum.
Artificial Intelligence is getting embedded in our lives on a regular basis in form of various speech recognition software, digital assistants like...
Today, the common public is aware, more than ever, regarding rights and privacy. Recent revelations made by whistleblowers like Edward Snowden and...
We all remember that game-changing personal hardware proxy device that guaranteed to provide you with Anonymous access to the Wi-Fi located up...
Most of the hackers would have heard about Backtrack. Weakerthan is another Linux based pentesting distro which is really good.. I think Weakerthan is second...
Now a days, we all save our data in a Word file or a PDF file. Some have basic information and some...
Mozilla Firefox has blocked Adobe Flash Player and it’s a good news. If you are a regular Firefox user you must have...
Whenever your computer, smartphone device or any other Internet-capable gadget is connected to the Internet, there is always a risk of security...
A planned Defcon talk around a low-cost privacy device called ProxyHam has been cancelled.
In April, ESET’s Laboratory in Latin America received a report on an executable program named "Liberty2-0.exe." Now, it asks is there a...
Yellow Jersey wearer targeted by critics who claim he has been using performance-enhancing drugs.
Just yesterday, the chief security officer at Facebook, Alex Stamos asked for the end for Adobe’s fragile and vulnerable software Flash Player...
How homograph attacks can present a spoofed, malicious link, and a case where a secure connection doesn't guarantee a safe site.
Scammers have become amusingly very popular in this day and age — They are the reason why holiday makers won’t keep their...
This real-time global cyber attack map is trending in the social media since couple of days. Colorful lasers depict the attacks that...
The LG Update Center Application faces yet another threat of cyber attack as was discovered by SEARCH-LAB Ltd in November 2014. A...
The Malaysian Police Facebook and Twitter added to the list of targeted government social media accounts — Monday afternoon saw the pages...
Virtual Machines are software that are used to run other operating systems within a pre-installed operating system. This self-contained OS runs as...
Barclays bank is to pay out around £500,000 in compensation to 2,000 customers whose personal data was found on a USB stick...