Sunday, 13 December 2015

Have You been Pwned? Has your email been hacked after Tesco, Ashley Madison, Sony data breaches?

This website tells you if your email has been leaked in ANY big website hack 2015 has been particularly bad in respect with cyber attacks. Such attacks have affected millions of users with their email addresses being leaked or stolen. While some of these emails may have been used for phishing the victim others could have been...
Continue Reading...

Saturday, 12 December 2015

Next iPhone 7 could not only be armored, but float on water too

Does an armored iPhone sound like a great idea to you? Apple has been able to pack a lot of technology in its latest iPhones, so that does not leave a lot of room for the company to put in more technology right? Looks like our claims will be put to rest thanks to the latest patent, which states that the next iPhone could have an...
Continue Reading...

Top 9 hacking groups sponsored by governments

Read about the top 9 hacking groups who are sponsored by governments around the world All the while we read about hacking groups like Impact Team, NullCrew, Anonymous, Lizard squad etc who conduct hacking operations on their own but we seldom get to hear about hacking groups who are sponsored by governments across the world. These state...
Continue Reading...

Friday, 11 December 2015

Who’ll Be The Winner: Human Intelligence Vs. Artificial Intelligence

Short Bytes: The emergence of highly advanced technologies allowing generic  selection and fabrication of complex traits, including the selection of logical reasoning abilities, suggests that Human Intelligence will co -evolve with Artificial Intelligence. While the belief in the abundance of availability and ease of fabrication...
Continue Reading...

WhatsSpy Public : WhatsApp status tool lets stalkers track you bypassing privacy settings

“WhatsSpy Public” a tool for spying on WhatsApp users bypassing security settings Social media is growing at a fast pace nowadays but with growing socialization the safety measures and privacy option should also be developed so that one’s information cannot be leaked at any endpoints. Social apps such as Facebook, WhatsApp, Hike, Instagram...
Continue Reading...

Wednesday, 2 December 2015

Top ten operating systems for ethical hackers and security researchers

A comprehensive list of most popular operating systems among hackers all around the world. Back in August, we had posted a list of top ten hacker tools. Now we have advanced it one step further to bring you the best operating systems for hackers. This time it is about operating systems, which have almost every necessary tool provided...
Continue Reading...

5 frightening hacking targets that everyone should be scared of

5 frightening hacking targets which include planes, guns, automobiles, Nuclear power plants and everyday devices With nearly 5 billion non-communication devices connected to the internet worldwide ranging from watches to CT-scanners to airplanes, providing government, cyber criminals and cyber terrorists can cause confusion and damage...
Continue Reading...

Meet Hack Rod, the world’s first car designed by Artificial Intelligence (AI)

This is Hack Rod, the first car designed by AI and first vehicle with a nervous system A company called Primordial Research Project is developing a car which is fully built by artificial intelligence. What’s more, the car is called Hack Rod, could well be the first vehicle with a nervous system. Hack Rod is a collaboration between...
Continue Reading...

Tuesday, 17 November 2015

You Can Now Remotely Turn Off Any Android Smartphone/Tablet By Sending SMS

This is how you can remotely turn off Android smartphones/tablets by sending a SMS Android is the most popular and widely used operating system in the world, which offers a lot of features to its users. To make Android more user friendly, a lot of apps are being developed to run on this OS. In this article, we will discuss about the apps...
Continue Reading...

Monday, 16 November 2015

Tired With Slow WiFi? Your Good Old FM Is Here To Help You

Short Bytes: Facing slower WiFi speed due to network congestion and signal interference is a very common problem. However, researchers have found a way to use FM Radio signals to solve this problem. Living in a crowded neighborhood can seriously affect your WiFi speed. For those who don’t know, you and the people living around you,...
Continue Reading...

Sunday, 15 November 2015

These Two Guys Spent 40 Years Making “World’s Only Real Jetpack”

Short Bytes: JB-9 JetPack, from the company JetPack Aviation, has showed off its jet turbine powered machine. In a demonstration of its capabilities, it was flown around the Statue of Liberty and over the Hudson river. The company JetPack Aviation calls itself the maker of world’s only real jetpack. This device is a backpack powered...
Continue Reading...

Thursday, 12 November 2015

Meet the world’s lightest metal which is 99.99% air

Researchers have created a metal for Boeing which is 99.99% air and light enough to balance on top of a dandelion. A few years ago, researchers created the world’s lightest metal for Boeing, and now the airline has shown it off for the first time in this new video. Called microlattice, the material is 100 times lighter than styrofoam but...
Continue Reading...

The quest for eternal life makes a Russian scientist inject himself with 3.5-million-year-old bacteria

Russian scientist injects himself with 3.5-million-year-old bacteria to get immortality People can go to any heights in the quest to have an eternal life. A Russian scientist, Anatoli Brouchkov, who injected himself with 3.5-million-year-old bacteria has said how it has helped him work longer and avoid the flu for the last two years. He...
Continue Reading...

Is Learning To Code Hard ?

Is learning to code hard? The answer would be yes,  its very hard, many people are willing to learn coding but the problem is they don’t know from where they need to start and they need to start coding. Also Read: Is coding the most important language in the World The real problem is people think that coding is going to be hard to learn. Well what we are willing to say is, if your willing to learn coding...
Continue Reading...

Tuesday, 10 November 2015

This 9-Year-Old Boy Is An Accomplished Hacker And CEO Of A Company

Short Bytes: Reuben Paul is a cybersecurity expert who lives in Austin, Texas, and attends third grade. He is the CEO of his own company Prudent Games and recently attended the Ground Zero Summit as a ‘special ambassador.’ His name is Reuben Paul and he’s just 9 years old. This third grader is already an accomplished hacker, cybersecurity...
Continue Reading...

Thursday, 5 November 2015

Quantum Internet is Coming, Quantum Teleportation Sets New Record

Short Bytes: The scientists have teleported photons across a distance of 63 miles (102 kilometres), four times the previously held record. This Quantum Teleportation research could lead to a “quantum Internet” that could build the base for the next-gen encryption. Anew distance record has been established, relaying the...
Continue Reading...

Teen Who Sold His App to Yahoo for $30 Million, Leaves Company to Study More

Short Bytes: Nick D’Aloisio has left Yahoo to concentrate on his computer science and philosophy studies at Oxford. Just two years ago, he sold his news-aggregation app called Summly to Yahoo for $30 million. Since then, he was working as a part-time product manager at Yahoo. Yesterday, we told you about Michael Sayman, one of...
Continue Reading...

Hackers can access your PC with this 10 second Fitbit hack

Fitbit health trackers can be hacked in 10 seconds and allow hackers to access your PC The health care gadgets market is growing phenomenally and Fitbit health tracker leads the band. In fact they are the most popular devices among people who like to track their steps and exercise. However, the very fitness band that you use to track your health can be used to gain access into your PC with a malware and wreak havoc. Fortinet...
Continue Reading...

Wednesday, 4 November 2015

Self-driving Cars Must be Programmed to Kill, Study Says

Short Bytes: As we advance more and more in artificial intelligence and related technologies, we must solve some complex ethical problems. A similar dilemma is faced in the case of self-driving cars and how they should act in case of unavoidable accidents. Should they kill more people on the road to save the car occupants? Or, should...
Continue Reading...

Sunday, 1 November 2015

Experts Explain The Car Hack Process – How to Hack a Car

Short Bytes : The recent Fiat Chrysler car hack exposed the vulnerabilities and the extent to which insecure IoT can be dangerous. The hacking of remote devices connected via internet of things is not new, and neither is the car hack. We notified you guys how Shodan-The Hacker Search Engine scouts for the devices connected to the internet and discloses the identity information making them...
Continue Reading...

Sunday, 25 October 2015

HTC: “It’s Apple That Copied Our Design, We Didn’t”

Short Bytes: Taking inspiration from another’s designs is an old tale in the smartphone industry. The latest controversy is revolving around iPhone 6-inspired HTC One A9. Defending HTC, a top executive said that it was Apple that copied HTC’s design. Read more to know the whole story. Recently we wrote about HTC One A9 that looks a lot like...
Continue Reading...

Monday, 19 October 2015

Hacker reveals how to extract PIN of a smartphone from any selfie

Corneal Key Logger can extract PIN of any smartphone using the owner’s selfie If you thought biometrics was the ultimate weapon of authentication, you may be proved wrong by Starbug. German researcher Jan Krissler, aka Starbug is a hacker whose claim to fame is breaching Apple’s TouchID and recreating the German defense minister’s thumbprint...
Continue Reading...

Advertising

Advertise Here

Blogroll

About