The convenience of public Wi-Fi for many people is invaluable, yet there are risks. With all this in mind, here are 10...
Most of you must have heard about Tor, which is one of the renowned network based on onion router, delivers a good...
“How Government secretly read your e-mails with this insane law?“ “Snowden’s Revelations: XKEYSCORE is NSA’s search engine.” “Real-Time Cyber Attacks across the globe. ““NSA’s...
Consumers in the UK would be happy to share their DNA if it would help secure their financial and personal information, according...
From the stage of Google I/O 2015, Google’s Regina Duggan introduced something that wants you to forget the passwords and become one...
Wireless Networking (Wi-Fi) has made it so easy for anyone to use Internet on your computer, mobile phones, tablets and other wireless...
Lack of some elementary security measures can risk your router’s security and this has stemmed to grow into a large-scale denial-of-service (DDoS)...
In a recent blog post, Mozilla has showed its intent to phase out the non-secure websites i.e. the HTTP. Earlier this week,...
A Kansas family are the latest victims of a hacked nanny cam, after noticing the device purchased to monitor their three-month-old baby...
Last week’s Apple Watch launch has put the spotlight back on the ‘smart’ inter-connected watches that are expected to change how we...
”Task Force Cyber Secure” was signed and established by Chief of Staff (CSAF) General Mark Walsh III on March 20, 2015 as...
Congratulations people! The app that we had been waiting for the since a long time, has finally arrived. Regretting a wrong message...
Linux shell or terminal commands are very powerful and just a simple command could lead one to delete a folder, files or root folder,...
Like many others, I was enchanted by The Hobbit (and later Lord of the Rings) at a young age - long before...
Security of open source code is a hot topic, what with Heartbleed, Shellshock, and Poodle making the news. Open source code is...
A new gadget from British drive maker Secure Drives forges off into Mission Impossible territory with a genuine, physical 'self-destruct' command which...
Hosting provider Namecheap said that it has come under attack from hackers apparently using the “Cybervor” hoard of 1.2 billion usernames and...
An ultra-secure phone claimed to be the first privacy-focused smartphone on sale swiftly fell victim to a security researcher - who hacked...
The Blackphone, a new super-secure Android handset is now on sale. The Blackphone offers encryption technology that makes snooping on calls or...
High-end Samsung phones could soon ship with a biometric scanner which puts fingerprint-swipe buttons (as seen in both Samsung and Apple’s flagship...
Apple’s Mavericks update was the first free update to Mac OS X – itself a big step forward for security, as all...