Good old times, when the ads weren't dangerous

Ads use inaudible sound to link your PC, smartphone, TV & tablets

A couple of years ago, some German scientists created a proof of concept to see if it was possible for data to jump across the air gap, using inaudible high frequency audio waves. "Using...
RIP flash

Google To Reject All Flash Based Ads From July

Advertising and search giant Google has taken yet another step in relegating Flash to the pages of history. From July 2016, it’s not going to accept Flash display advertisements. From June 30,...
dont challenge hackers

Challenging Hackers Is Never A Good Idea

In spite of all the big breaches reported last year, Real Future’s Kevin Roose wished to find out how nicely he would fare in a personal pen-test. Issuing such a “hack me” challenge is...
qualcomm vulnerable

Once again, a billion plus android devices vulnerable

  Once again, more than a billion Android gadgets are vulnerable to a security hole in Qualcomm's Snapdragon chip that may very well be exploited by any malicious hacker to gain full...
mouse hack

Wireless mouse leave billions at risk of computer hack: cyber security firm

Balint Seeber and Marc Newlin are checking how far apart they can be while still have the ability to hack into one another's computers. It turns out its not a small...
fcc data privacy

Online Privacy: The Latest Way the FCC is Protecting You

Earlier this month, the Federal Communications Commission (FCC) submitted a proposal designed to protect consumers’ privacy on the Internet. To date, Internet service providers have collected data on their users without...

Researchers can accurately identify people using their brain waves

Yes, Brain Waves. For the longest time, the world has relied on fingerprints as a technique to easily identify individuals. It's because a fingerprint is unique (and permanent) for each individual—so what happens...
whatsapp hack

XNSPY – A Software Spy WhatsApp Cannot Fend off

Note: Read the comments before you buy this app. There have been many problems reportedly and the software may not work as advertised and the support may not be there. We...
clean teslacrypt ransonware

TeslaCrypt Ransomware Creators Giveup The Master Key

  Many of you are already aware of what a 'ransomware' is. For those who don't know, a ransomware is a type of a virus or malware that takes over a computer...
keysniffer keyboard hacker

Hackers Can Snoop on Wi-Fi Keyboards From Many Meters Away

A number of popular manufacturers of wireless keyboards have been betraying their owners, broadcasting their keystrokes for savvy hackers to intercept from hundreds of meters away. According to research published yesterday by Bastille, a...

HOT NEWS