“You Can Hack a Computer Just by Looking at It” – HP Explains Visual Hacking
Short Bytes: Visual Hacking is a security threat that is often overlooked by us. This is…
Short Bytes: Visual Hacking is a security threat that is often overlooked by us. This is…
Short Bytes: In the third article of the “Steps to Effective Security” series, I’ll tell you…
Short Bytes: The Chinese government has taken an unprecedented step to comply with a U.S. request and…
Short Bytes: DuckDuckGo CEO Gabriel Weinberg takes a dig at Google in his AMA session saying,…
Short Bytes: To keep your WhatsApp data safe and encrypted, WhatsApp has partnered with Google Drive. Take…
Short Bytes: Former NSA contractor and a newbie to Twitter, Edward Snowden, forgot to turn off…
Short Bytes: The humble wireless router in your home, as you might not think, could be…
Short Bytes: As more and more Linux systems are going online, the threat to the once-secure…
Short Bytes: To address your privacy concerns, Silent Circle has tried to create the super-secure Android…
Short Bytes: Security firm Zerodium has launched “The Million Dollar iOS 9 Bug Bounty”, that offers…