We Live Security looks at six of the biggest online gaming hacks to date – From Xbox Live and PSN, to Big...
Everyone now a days has one or two additional pendrives and hard disks with them because pendrive makes sharing of data very...
The cyber war between Armenians and Azerbaijani hackers is never ending. Just like today when Armenian hackers leaked trove of data containing personal...
Every Android mobile has Google Play Store pre-installed on its device. Play Store is an awesome market to download some awesome applications...
Today the Linux Foundation announced a new initiative called R Consortium- a group to unite the users of the open-source R programming...
Links traced to “Animal Farm” group and State Sponsored cyber criminals who already have targeted Syrian and Iranian computers in 2013. Bratislava,...
Facebook is the number one social networking website with more than one billion active users. All of us have a Facebook profile...
Yes, you heard that right. You can access your computer’s hard drive with your smartphone in few simple steps. For this, you...
A series of more than 160 data breaches have struck local authorities in Norfolk, Suffolk and Cambridgeshire over the past year, according...
Facebook is the No.1 Social Networking website with more than 1.2 Billion active users. Everyone posts images on FB. Whenever we surf...
There may be many reasons to download torrent files using IDM. It may be that you get good speed using IDM, no...
If you were busy celebrating the fact that the Patriot Act will bring an end to NSA’s mass surveillance, you should take...
The online hacktivist Anonymous conducted a massive DDoS attack on the official website of Canadian Security Intelligence Service (CSIS) and forced it to go...
Phishing attacks have become a common norm now but lately, a different kind of social engineering hack has been identified, which uses...
Nowadays wearable devices, especially fitness checking devices, are very much in vogue. However, security and technology experts are prompting warnings about the...
The pro-Palestine hackers from AnonGhost are known for their hacks against Israel and other high-profile websites to spread free Palestine messages. The...
An entire US department program is to be suspended in order to fix vulnerabilities discovered during a security audit.
In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by...
Getting started on designing a network is a task of formidable proportions, but all the more so if you are looking to...
Public Wi-Fi networks seem really convenient don’t they! Whether you are at McDonald’s (or just any other food joint offering an open...