New security flaws affect 4G and 5G standard networks

New security flaws affect 4G and 5G standard networks

Vulnerabilities in 4G, 5G network allow attackers to intercept calls and track phone locations A group of researchers have discovered three new security vulnerabilities in...
$5 PoisonTap device can hack into any locked Windows or Mac run computer

$5 PoisonTap device can hack into any locked Windows or Mac...

"PoisonTap" Device Made Using $5 Raspberry Pi Can Easily Hack Password-Protected Computers The lock screen of a computer is the ultimate locked door which every...
Emma Watson reveals she received intimate photo leak threat within hours of UN speech

Emma Watson reveals she received intimate photo leak threat within hours...

Received threats of NSFW photo leaks minutes after the gender equality speech - Emma Watson Emma Watson yesterday revealed that she received the threats to...
The Psychology Behind the Rise of Social Media

The Psychology Behind the Rise of Social Media

More and more people are going online each year. As a response, more and more companies are also bringing their offers and operations to...
Surprise, there are more Bible malware apps than poker malware Apps

Surprise, there are more Bible malware apps than poker malware Apps

Good vs Evil : There Are More Malicious Bible Apps than There Are Malicious Poker Apps This is bound to surprise any Internet user!!! You could...

3 Government, 2 Educational website of Peru hacked, defaced by Anonymous...

Anonymous hacker h1pd34d have defaced 5 websites of Peru including 3 government websites and 2 educational websites. Anonymous hacker h1pd34d, going with handle @hipdead010 on twitter have defaced...
Google releases Nogotofail tool to test vulnerability to Man-in-the-Middle attacks

Google releases Nogotofail tool to test vulnerability to Man-in-the-Middle attacks

Google releases Nogotofail tool to test vulnerability to Man-in-the-Middle attacks This last year has produced a number of attacks using network vulnerabilities, from Heartbleed to...
Now cyber criminals use E-cigarettes to spread malware

Now cyber criminals use E-cigarettes to spread malware

Now cyber criminals use E-cigarettes to spread malware Many health specialists may be pushing the chain smokers in the world for E-cigarettes over normal tobacco...
More stable, Tor Browser 4.0.4 released

More stable, Tor Browser 4.0.4 released

Tor, The Onion routing Anonymity browser which is the first love for every online privacy advocates has released its latest version, Tor Browser 4.0.4. The latest release, Tor...

Moroccan Islamic Union- Mail hacks and deface Government and several other...

Anonymous Hacker group going with the handle 'Moroccan Islamic Union- Mail' hacked and defaced several websites of South Africa and Zambia including few Government...

Follow US

338,000FansLike
2,500FollowersFollow
19,000FollowersFollow
1,981SubscribersSubscribe

recent post