This website tells you if your email has been leaked in ANY big website hack
2015 has been particularly bad in respect with cyber attacks. Such attacks have affected millions of users with their email addresses being leaked or stolen. While some of these emails may have been used for phishing the victim others could have been...
This blog gives you hints about the Reality of life,News,Gossip,Latest Technology,Hacking tips, latest software and tools and lot more
Sunday, 13 December 2015
Saturday, 12 December 2015
Next iPhone 7 could not only be armored, but float on water too
Does an armored iPhone sound like a great idea to you?
Apple
has been able to pack a lot of technology in its latest iPhones, so that
does not leave a lot of room for the company to put in more technology
right? Looks like our claims will be put to rest thanks to the latest
patent, which states that the next iPhone could have an...
Top 9 hacking groups sponsored by governments
Read about the top 9 hacking groups who are sponsored by governments around the world
All the while we read about hacking groups like Impact Team, NullCrew, Anonymous, Lizard squad etc who conduct hacking operations on their own but we seldom get to hear about hacking groups who are sponsored by governments across the world. These state...
Friday, 11 December 2015
Who’ll Be The Winner: Human Intelligence Vs. Artificial Intelligence
Short Bytes: The emergence of highly
advanced technologies allowing generic selection and fabrication of
complex traits, including the selection of logical reasoning abilities,
suggests that Human Intelligence will co -evolve with Artificial
Intelligence.
While
the belief in the abundance of availability and ease of fabrication...
WhatsSpy Public : WhatsApp status tool lets stalkers track you bypassing privacy settings
“WhatsSpy Public” a tool for spying on WhatsApp users bypassing security settings
Social
media is growing at a fast pace nowadays but with growing socialization
the safety measures and privacy option should also be developed so that
one’s information cannot be leaked at any endpoints. Social apps such
as Facebook, WhatsApp, Hike, Instagram...
Wednesday, 2 December 2015
Top ten operating systems for ethical hackers and security researchers
A comprehensive list of most popular operating systems among hackers all around the world.
Back in August, we had posted a list of top ten hacker tools. Now we have advanced it one step further to bring you the best operating systems for hackers.
This
time it is about operating systems, which have almost every necessary
tool provided...
5 frightening hacking targets that everyone should be scared of
5 frightening hacking targets which include planes, guns, automobiles, Nuclear power plants and everyday devices
With
nearly 5 billion non-communication devices connected to the internet
worldwide ranging from watches to CT-scanners to airplanes, providing
government, cyber criminals and cyber terrorists can cause confusion and
damage...
Meet Hack Rod, the world’s first car designed by Artificial Intelligence (AI)
This is Hack Rod, the first car designed by AI and first vehicle with a nervous system
A
company called Primordial Research Project is developing a car which is
fully built by artificial intelligence. What’s more, the car is called
Hack Rod, could well be the first vehicle with a nervous system.
Hack Rod is a collaboration between...
Tuesday, 17 November 2015
You Can Now Remotely Turn Off Any Android Smartphone/Tablet By Sending SMS
This is how you can remotely turn off Android smartphones/tablets by sending a SMS
Android is the most popular and widely used operating system in the world, which offers a lot of features to its users. To make Android more user friendly, a lot of apps are being developed to run on this OS.
In this article, we will discuss about the apps...
Monday, 16 November 2015
Tired With Slow WiFi? Your Good Old FM Is Here To Help You
Short Bytes: Facing slower WiFi speed due to
network congestion and signal interference is a very common problem.
However, researchers have found a way to use FM Radio signals to solve
this problem.
Living in a crowded neighborhood can seriously affect your WiFi speed. For those who don’t know, you and the people living around you,...
Sunday, 15 November 2015
These Two Guys Spent 40 Years Making “World’s Only Real Jetpack”
Short Bytes: JB-9 JetPack, from the company
JetPack Aviation, has showed off its jet turbine powered machine. In a
demonstration of its capabilities, it was flown around the Statue of
Liberty and over the Hudson river.
The
company JetPack Aviation calls itself the maker of world’s only real
jetpack. This device is a backpack powered...
Thursday, 12 November 2015
Meet the world’s lightest metal which is 99.99% air

Researchers have created a metal for Boeing which is 99.99% air and light enough to balance on top of a dandelion.
A few years ago, researchers created the world’s lightest metal for Boeing, and now the airline has shown it off for the first time in this new video. Called microlattice, the material is 100 times lighter than styrofoam but...
The quest for eternal life makes a Russian scientist inject himself with 3.5-million-year-old bacteria

Russian scientist injects himself with 3.5-million-year-old bacteria to get immortality
People can go to any heights in the quest to have an eternal life. A Russian scientist, Anatoli Brouchkov, who injected himself with 3.5-million-year-old bacteria has said how it has helped him work longer and avoid the flu for the last two years. He...
Is Learning To Code Hard ?
Is learning to code hard?
The answer would be yes, its very hard, many people are willing to learn coding but the problem is they don’t know from where they need to start and they need to start coding.
Also Read: Is coding the most important language in the World
The real problem is people think that coding is going to be hard to learn. Well what we are willing to say is, if your willing to learn coding...
Tuesday, 10 November 2015
This 9-Year-Old Boy Is An Accomplished Hacker And CEO Of A Company
Short Bytes: Reuben Paul is a cybersecurity
expert who lives in Austin, Texas, and attends third grade. He is the
CEO of his own company Prudent Games and recently attended the Ground
Zero Summit as a ‘special ambassador.’
His
name is Reuben Paul and he’s just 9 years old. This third grader is
already an accomplished hacker, cybersecurity...
Thursday, 5 November 2015
Quantum Internet is Coming, Quantum Teleportation Sets New Record
Short Bytes: The scientists have teleported photons across a distance of 63 miles (102 kilometres), four times the previously held record. This Quantum Teleportation research could lead to a “quantum Internet” that could build the base for the next-gen encryption.
Anew distance record has been established, relaying the...
Teen Who Sold His App to Yahoo for $30 Million, Leaves Company to Study More
Short Bytes: Nick D’Aloisio has left Yahoo to concentrate on his computer science and philosophy studies at Oxford. Just two years ago, he sold his news-aggregation app called Summly to Yahoo for $30 million. Since then, he was working as a part-time product manager at Yahoo.
Yesterday, we told you about Michael Sayman, one of...
Hackers can access your PC with this 10 second Fitbit hack
Fitbit health trackers can be hacked in 10 seconds and allow hackers to access your PC
The health care gadgets market is growing phenomenally and Fitbit health tracker leads the band. In fact they are the most popular devices among people who like to track their steps and exercise. However, the very fitness band that you use to track your health can be used to gain access into your PC with a malware and wreak havoc.
Fortinet...
Wednesday, 4 November 2015
Self-driving Cars Must be Programmed to Kill, Study Says
Short Bytes: As we advance more and more in artificial intelligence and related technologies, we must solve some complex ethical problems. A similar dilemma is faced in the case of self-driving cars and how they should act in case of unavoidable accidents. Should they kill more people on the road to save the car occupants? Or, should...
Sunday, 1 November 2015
Experts Explain The Car Hack Process – How to Hack a Car
Short Bytes : The recent Fiat Chrysler car hack exposed the vulnerabilities and the extent to which insecure IoT can be dangerous. The hacking of remote devices connected via internet of things is not new, and neither is the car hack. We notified you guys how Shodan-The Hacker Search Engine scouts for the devices connected to the internet and discloses the identity information making them...
Sunday, 25 October 2015
HTC: “It’s Apple That Copied Our Design, We Didn’t”
Short Bytes: Taking inspiration from another’s designs is an old tale in the smartphone industry. The latest controversy is revolving around iPhone 6-inspired HTC One A9. Defending HTC, a top executive said that it was Apple that copied HTC’s design. Read more to know the whole story.
Recently we wrote about HTC One A9 that looks a lot like...
Monday, 19 October 2015
Hacker reveals how to extract PIN of a smartphone from any selfie
Corneal Key Logger can extract PIN of any smartphone using the owner’s selfie
If you thought biometrics was the ultimate weapon of authentication, you may be proved wrong by Starbug. German researcher Jan Krissler, aka Starbug is a hacker whose claim to fame is breaching Apple’s TouchID and recreating the German defense minister’s thumbprint...
Subscribe to:
Posts (Atom)
Advertising
Advertise Here
Blogroll
About
Designed By Templateism | Seo Blogger Templates