Short Bytes: ORWL is the first open source, physically secure computer. Using a secure microcontroller (MCU) and an ‘active clamshell mesh’, the device makes sure...
Short Bytes: Bitdefender is here with its new lineup of revamped antivirus solutions. This range includes Bitdefender Internet Security 2017, Bitdefender Total Security...
Short Bytes: The development team of Tails, the anonymity-focused Debian GNU/Linux-based Live CD operating system, is here with its latest release. Tails...
Today, it is still true that Mac has less malware problem than its counterparts Windows and Android. But, it does not mean...
HTTPS and VPN traffic broken with new semi-practical attack. Two scientists from the French Institute for Research in Computer Science and Automation (INRIA)...
Keys to BYPASS UEFI secure boot Microsoft accidentally leaked the Secret keys to BYPASS UEFI secure boot that allow hackers to unlock devices...
Short Bytes: Two researchers reported that Microsoft accidently compromised the golden keys to its UEFI Secure boot feature. The golden keys allow...
Were 15 million Iranian accounts truly placed at risk?Telegram has fought back against researcher claims that Iranian cyberattackers have managed to compromise...
The Internet is a great place to do business and cybercriminals are aware of that fact so how can you protect your networks,...
Short Bytes: Researchers at MIT and EPFL have come up with a new anonymity network that is said to be more secure...
Social media platforms are increasingly being targeted, as Facebook CEO Mark Zuckerberg found out earlier this month. Here, we look at how...
Forty-nine years after the first ATM was installed in London, we ask how secure our cash machines are today?
Understanding how to delete your smartphone data before selling your device is important if you want to protect your privacy and keep...
There are statistical evidences supported by data destruction companies which present that in countries like Mexico, Brazil, United States, Colombia, Costa Rica,...
Short Bytes: Deciding a security-focused password is tougher that one might think. Even the most security-conscious users commit the mistake of forming...
Following the recent security breach suffered by the Qatar National Bank has assured that its systems are “fully secure”. Sequel to a...
VNC Roulette allows you to randomly view insecure desktops accessible over the internet. Recently, a new website has come up on the Internet,...
Short Bytes: To answer your security related concerns, Subgraph OS is here as a free, secure, open source Linux operating system for...
Databases can be a treasure trove of confidential data. Normally most databases contain confidential information, private data of companies, people, intellectual property,...
Messages coming to or from non-encrypted sources will be flagged by Google. Google has confirmed a number of changes to Gmail with...
Short Bytes: Remember the white hat hackers — The White Team — responsible for creating the Linux.Wifatch malware last October? The same hackers...