Skip to content
FOSSBYTES-TECH-SIMPLIFIED-LOGO
  • Guides
  • Best of Lists
  • Explained
  • Reviews
  • Sponsored
  • Stories
FOSSBYTES-TECH-SIMPLIFIED-LOGO
Home / Security - Page 70

Security

evil penguin malware trojan xor ddos
Security

This New Linux Trojan Launches Deadly DDoS Attacks at 150+ Gpbs

ByAdarsh Verma September 30, 2015

Short Bytes: As more and more Linux systems are going online, the threat to the once-secure…

Read More This New Linux Trojan Launches Deadly DDoS Attacks at 150+ GpbsContinue

blackphone 2 secure
Mobile & Tablet Security

Blackphone 2 Could Be the Most Secure Android Phone Ever, And It’s Now On Sale

ByAdarsh Verma September 30, 2015September 30, 2015

Short Bytes: To address your privacy concerns, Silent Circle has tried to create the super-secure Android…

Read More Blackphone 2 Could Be the Most Secure Android Phone Ever, And It’s Now On SaleContinue

million dollar ios 9 bug bounty
Apps & Software Security

World’s Biggest 0-day Bug Bounty Program: Hack Apple iOS 9 to Win $1,000,000

ByAdarsh Verma September 22, 2015

Short Bytes: Security firm Zerodium has launched “The Million Dollar iOS 9 Bug Bounty”, that offers…

Read More World’s Biggest 0-day Bug Bounty Program: Hack Apple iOS 9 to Win $1,000,000Continue

chrome crash characters
Security Web & Social

How and Why Crash Google Chrome With These 16 Characters in 2 Seconds

ByAdarsh Verma September 20, 2015October 16, 2015

Short Bytes: Do you want to crash someone’s Google Chrome just for the heck of it?…

Read More How and Why Crash Google Chrome With These 16 Characters in 2 SecondsContinue

nsa gchq spying tool privacy international
Security Web & Social

Did NSA and GCHQ Spy on You? Here’s How to Find Out and Complain

ByAdarsh Verma September 16, 2015March 31, 2022

Short Bytes: Do you have a feeling that NSA and its British counterpart GCHQ spied on…

Read More Did NSA and GCHQ Spy on You? Here’s How to Find Out and ComplainContinue

self destruct chip computer FILEminimizer
Gadget & Machine Security

This Computer Chip Self-destructs in 10 Seconds to Protect Your Secrets

ByAdarsh Verma September 16, 2015

Short Bytes: PARC has developed a self-destructing computer chip under DARPA’s vanishing programmable resource project. The…

Read More This Computer Chip Self-destructs in 10 Seconds to Protect Your SecretsContinue

MIT most insecure university
Security Tech

MIT is the Most Insecure University in the US

ByAashish Sharma September 12, 2015September 12, 2015

Short Bytes: MIT may boast of having one of the smartest bunch of people under one…

Read More MIT is the Most Insecure University in the USContinue

fake baby car seat
Gadget & Machine Security

This Fake Baby Car Seat is Made to Help Governments Spy on You

ByAdarsh Verma September 10, 2015September 10, 2015

Short Bytes: A recent report from the Privacy International reveals a fake baby car sear that…

Read More This Fake Baby Car Seat is Made to Help Governments Spy on YouContinue

microsoft usa court
Security Tech

Microsoft Is Fighting the US Government to Protect YOUR Data. Surprised?

ByAdarsh Verma September 9, 2015September 12, 2015

Short Bytes: Microsoft is heading to the court to battle the U.S. Department of Justice to protect…

Read More Microsoft Is Fighting the US Government to Protect YOUR Data. Surprised?Continue

linux foundation security tips list
Geek Security

Security Tips by the Expert: How Linux Foundation Protects its Computers

ByAdarsh Verma September 9, 2015

Short Bytes: Today, we’ve brought some security tips from the Linux Creators. Read the article that…

Read More Security Tips by the Expert: How Linux Foundation Protects its ComputersContinue

Page navigation

Previous PagePrevious 1 … 68 69 70 71 72 … 80 Next PageNext
  • About Us
  • Contact Us
  • Jobs
  • Privacy Policy
  • Cookie Policy
  • Editorial Policy
  • Terms of Service

© 2025 Fossbytes Media

Instagram Threads Facebook YouTube Twitter Linkedin
  • Guides
  • Best of Lists
  • Explained
  • Reviews
  • Sponsored
  • Stories
Search