Technology - Hacking

Technology news and blogs

US Air Force Drone Breached Through Home Router Vulnerability

July 12, 2018 | By Kim Crawley Loading... Drone aircraft are some of the U.S. Air Force’s deadliest weapons. Information...

Timehop data breach is worse than they initially said

‘Time capsule’ app Timehop has revealed that it made a boo-boo when it initially shared details over the weekend of a data breach involving millions of users’ names, email addresses,...

Timehop Releases New Details About July 4 Breach

Additional information includes PII affected and the authentication issue that led to the breach.Timehop, the company that specializes in "digital nostalgia," is releasing more information on the July 4 breach...

Google’s Chrome RAM usage increases due to Spectre fixes

Google Chrome will now consume more RAM, thanks to Spectre fix Although Google’s Chrome started out as one of the least memory hungry browsers in the market, the web browser has...

Ukraine Security Service Stops VPNFilter Attack at …

The facility's process control system and emergency-detection system were infected, Interfax Ukraine reports.Ukraine's SBU Security Service reportedly detected and shut down a cyberattack that used VPNFilter malware on network equipment...

5 Things The US Needs To Avoid To Beat China At Quantum Computing

The race for better quantum research is on. If the United States of America wants to stave off the competition from getting ahead in quantum computing then it will have to...

What is Cryptocurrency – Meaning, Trading, Mining, Exchange, Charts, Prices, List [2018]

Know all about what is cryptocurrency mining, meaning, trading, charts, prices, list, wiki here in this article. How cryptocurrency works.. The post What is Cryptocurrency – Meaning, Trading, Mining, Exchange, Charts,...

Lessons from My Strange Journey into InfoSec

Establishing an entree into the security world can be a maddeningly slow process. For those of us already here, it can be an opportunity to help others. If you looked...

How to Structure an Enterprise-Wide Threat …

To keep an organization safe, you must think about the entire IT ecosystem.The ever-expanding range and diversity of cyber threats make it difficult for organizations to prioritize their offensive and...

APLICATIONS

Three Hacking Groups You Definitely Need to Know About

Hacker groups began to flourish in the early 1980s with the emergence of computer. Hackers are like predators that can access your private...

HOT NEWS