After more than 2 years of loyal service of my 2G iphone, was about time to get a new mobile. Of course 3Gs was the one I looked at first…
An error-checking algorithm found in software used to attack Google and other large companies circulated for years on English-speakinglanguage books and websites, casting doubt on claims it provided strong evidence…
Traffic jerked to a standstill as rubbernecking motorists ogled a pornographic clip posted by hackers on big-screen video billboards in Moscow, Russian news agencies reported on Friday. The company that…
Hackers apparently were able to access a system used to help Google comply with search warrants by providing data on Google users, said a source familiar with the situation, who…
Airlines, beware! With the Bangalore International Airport leaving the wi-fi hotspots unsecured at the airport, a hacker can break into the servers containing your databases and tamper with sensitive information…
First the iPhone, now the Droid: A hacker has unleashed an exploit that lets a user wrest administrative root control of his or her Motorola Droid smartphone. The code, which…
If you thought 2009 was filled to the brim with malware, spyware and bots, wait till you see what lies is store for 2010.
The Disney Company is always so good at accessing one’s inner child. The hope, the joy, the glory of absolute love, family goodness, and everything that sails in it. So…
Facebook architecture allows 3rd parties to install bunch of applications that will let you play, make some quiz and other. Basically the will suck your profile informations and parse the…
Press up, up, down, down, left, right, left, right, b, a, enter key then press up and down then magic circles will appear. Just reload the page to remove it….