The heated battle between Apple and the FBI provoked a lot of talk about Encryption – the technology that has been used to keep all your bits and bytes as safe as possible.
We can not say a lot about Apple’s users, but Android users are at severe risk when it comes to encryption of their personal and sensitive data.
Android’s full-disk encryption can be cracked much more easily than expected
Google has finally announced the official name of the latest version of its Android mobile software, codenamed Android N: “Nougat.”
Yes, the next version of sugary snack-themed Android and the successor to Android Marshmallow will now be known as Android Nougat, the company revealed on Snapchat and Twitter.
<!– adsense –>
The announcement comes days after Google set up
The Internet of Things (IoTs) or Internet-connected devices are growing at an exponential rate and so are threats to them.
Due to the insecure implementation, these Internet-connected embedded devices, including Smart TVs, Refrigerators, Microwaves, Set-top boxes, Security Cameras and printers, are routinely being hacked and used as weapons in cyber attacks.
If just relying on the security tools of Microsoft Office 365 can protect you from cyber attacks, you are wrong.
Variants of Cerber Ransomware are now targeting MS Office 365 email users with a massive zero-day attack that has the ability to bypass Office 365’s built-in security tools.
According to a report published by cloud security provider Avanan, the massive zero-day Cerber ransomware
Hey! Welcome to the United States. May we have your Twitter handle, please?
That’s exactly what you’ll likely be asked by the U.S. Customs and Border Protection at the airport prior to entering U.S. soil.
Yes, your Twitter handle may soon be part of the US Visa process as U.S. Customs and Border Protection has entered a new proposal into the federal register, suggesting a new field in which
We have been hearing a lot about Rule 41 after the US Department of Justice has pushed an update to the rule.
The change to the Rule 41 of the Federal Rules of Criminal Procedure grants the FBI much greater powers to hack legally into any computer across the country, and perhaps anywhere in the world, with just a single search warrant authorized by any US judge.
When it comes to data breaches of major online services like LinkedIn, MySpace, Twitter and VK.com, it’s two-factor authentication that could save you from being hacked.
Two-factor authentication or 2-step verification is an effective way to secure online accounts, but many users avoid enabling the feature just to save themselves from irritation of receiving and typing a six-digit code that
China beats its own record with the World’s fastest supercomputer.
Sunway TaihuLight, a newly built supercomputer from China, now ranks as the world’s most powerful machine.
During the International Supercomputer Conference in Germany on Monday, Top500 declared China’s 10.65 Million-core Sunway TaihuLight as the world’s fastest supercomputer. Moreover, the supercomputer is leading by a wide
T-Mobile is the latest in the list of recent high-profile data breaches, though this time the breach is not carried out by “Peace” – the Russian hacker who was behind the massive breaches in some popular social media sites including LinkedIn, MySpace, Tumblr, and VK.com.
Instead, one of the T-Mobile’s employees stole more than 1.5 Million customer records at the T-Mobile Czech Republic in
A critical flaw in the video conferencing software of the Quebec Liberal Party (PLQ) − a Canadian federalist provincial political party − allowed a user to spy on and hear the strategy discussions of the party at its premises and even access the live video camera feeds.
But luckily, the unknown white hat hacker who discovered the flaw alerted the PLQ staff of the security issue, showing them