So you possess an antivirus securing your system, your firewall is up, your browser plug-ins are all up-to-date, and you’re not leaving out any security mends. But how can be rest assured your defense mechanisms are really working as well ...

Phishing occurs when someone undertakes to use electronic communication such as email to fraudulently gain private information such as password thereby pretending to be an entruted person or a part of a trusted group. With such private information on the ...

Hackers set onn against Bitcoin wallet Inputs.io and slipped away 4,100 Bitcoins. At present prices for the online substitute currency, that sums upto $1.18 million. Inputs.io barons a Bitcoin billfold service where possessors can easily send out and receive Bitcoin. ...

The e-mail services like Gmail, Yahoo and Hotmail may be banned by the Indian government for official use after allegations of cyber spying by the US has been reported. Email service providers such as Gmail has their servers based in ...

In an endeavor to ease privacy worries succeeding the of late PRISM revelations, Google has declared that it would automatically encipher all the data which has been uploaded in its cloud storage service. Under the modern service, the 128-bit Advanced ...

Almost every software that has been developed till date has bugs in it. Applications are very complicated and the chance of presence of an error is always high that the developers didn’t fix at the time of developing. This mere ...

The Ubuntu forum is the latest one to suffer a data breach in its huge database from a hacker which took place on around 20th July night. A forecast tells that around 1.82 millions accounts have been struck upon. The ...