When a young Swiss hacker and an Interpol agent met in the Vatican on Friday, they understandably differed on many issues. They did, however, coincide in a recommendation for Catholic…
Researchers at the University of Pennsylvania say they’ve discovered a way to circumvent the networking technology used by law enforcement to tap phone lines in the U.S. The flaws they’ve…
If you’re one of the about 10% of Twitter users that protect your tweets, watch out, because anybody can read them with a simple Google search.
Dutch hacker accesses jailbroken iPhones, requests €5
barackobama.com is the official website of the president of USA who is probably the most powerfull man in the world.Same, it is the most protected man on earth. Theoretically, his…
Recently, Roger Thompson, chief research officer at security firm AVG, discovered over half a dozen Facebook applications that had been compromised by malicious hackers. Although the apps’ reach was small…
It’s been requested for months, and it’s finally here. No need to sign up an acount on the blog to post here. Just use your login/password from gmail, hotmail, aol,…
according to the site defacement archive hosted at Zone-H, that on or around October 5th an NSA web site application was the victim of an SQL injection exploit
We’ve been waiting for so long for this, Finally now we can use our iPhone as a USB Pendrive that too without installing any client-side application on our PC/MAC. All…
Thousands of Windows Live Hotmail passwords have been leaked online, Microsoft has confirmed. The news was first reported by Neowin. According to Microsoft, it “learned that several thousand Windows Live Hotmail…