Original Equipment Manufacturers (OEM) refer to the first boot of a new PC as the out-of-box experience (OOBE). As you battle your...
The serious vulnerabilities impact Samsung’s Knox security sandbox. A number of severe problems have been discovered within the Samsung Knox security system in...
The National Toxicology Program (NTP) carried out a US $25million study, which spanned over 2.5 years. Now, we have gotten to know...
This Miraculous Skin Cream can Remove Wrinkles Instantly Reducing wrinkles and preventing the signs of aging from affecting our youthful appearance and...
Someone leaked entire Mexican voter data on the Internet and it was not even password protected A database containing voter data of...
Your chat history on iMessage just went through a period when it was not altogether safe, but now, all wrongs have been...
Last week at the CeBIT the Lookout’s Co-Founder and CTO Kevin Mahaffey talked about hacking Tesla Model S providing indications on possible...
Security researchers 2, Radamant coder 0.Researchers from InfoArmor, an Arizona-based cyber-security firm, have discovered an SQL injection flaw in the control panel...
Insecure configurations expose car telematics to hacking. Industrial vehicles like trailer trucks, delivery vans, or buses that have an Internet connection, can be...
A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor hacking. In...
Short Bytes: When we visit a hospital, we put our complete trust in our doctor and the medical equipment that he/she uses....
This smart building was hacked by IBM researchers to show hacking risks associated with Internet of Things. IBM security researchers are warning...
Tor Project patches critical bug but refuses to acknowledge the bug discovery by a security researcher. Tor Project’s website had a critical cross-site...
Experts at the SANS Technology Institute spotted an OS X scareware campaign that leverages fake Adobe Flash Player installers. Johannes Ullrich, security...
For cybercriminals developing an Android malware is a piece of cake and the problem is Google just not care. According to Dr.Web’s security...
Radamant ransomware v1 and v2 are now decryptable. Fabian Wosar, security researcher at Emsisoft, has managed to crack the encryption algorithm for the...
Chris Vickery, a security researcher who is known for finding leaked databases online claims he has found US voter registration records of 191...
Wesley Wineberg, an independent security researcher, participating in Facebook’s bug bounty program, managed to crack his way through Instagram defenses and almost...
Facebook doesn’t appreciate the effort, threatens to sue. Wesley Wineberg, an independent security researcher, participating in Facebook’s bug bounty program, managed to crack...
Websites and apps around the world encourage researchers to find bugs in their system, but an Internet dating app for HIV positive...
ShortRead: MacKeeper, a utility software suite for Mac OS X faced a data breach which has exposed details in relation to its...