Wednesday , August 31 2016

How to Check Your Motherboard Model Number on Your Windows PC

mobo

Whether you need to update drivers, want to check hardware compatibility, or you’re just curious, it’s way easier to check your motherboard model number with these simple tricks than it is to crack open your computer case to check the board itself. Read on as we show you how to check …

Read More »

Facebook launches OpenCellular — An open-source Wireless Access Platform

OpenCellular-Facebook-Wireless-Internet

Big technology companies are in the race of bringing Internet connectivity to unconnected parts of the world through flying drones, high-altitude balloons, and laser beams, but Facebook has announced a far less expensive method to provide connectivity to rural areas. Facebook CEO Mark Zuckerberg announced Wednesday the creation of a …

Read More »

Apple hires developer of World’s Most Secure Messaging App

apple-encryption

Apple is serious this time to enhance its iPhone security that even it can not hack. To achieve this the company has hired one of the key developers of Signal — World’s most secure, open source and encrypted messaging app. Frederic Jacobs, who worked to develop Signal, announced today that he …

Read More »

Apple is working on New iPhone Even It Can’t Hack

iphone-hack

Amid an ongoing dispute with the United States government over a court order to unlock iPhone 5C of one of the San Bernardino shooters Syed Farook… …Apple started working on implementing stronger security measures “even it can’t hack” to achieve un-hackability in its future iPhones. The Federal Bureau of Investigation …

Read More »

Judge Confirms Government Paid CMU Scientists to Hack Tor Users for FBI

tor-hack

Everything is now crystal clear: The security researchers from Carnegie Mellon University (CMU) were hired by the federal officials to discover a technique that could help the FBI Unmask Tor users and Reveal their IP addresses as part of a criminal investigation. Yes, a federal judge in Washington has recently …

Read More »

Asus Faces 20 years of Audits Over Poor Wi-Fi Router Security

asus-router-hack

Currently, Asus is undergoing through a troublesome situation after a lawsuit had been filed by the US Federal Trade Commission (FTC) regarding its Router Insecurity. On Tuesday, FTC settled charges with Asus, where the hardware manufacturing company agrees to: Undergo Independent Security Audits Once in 2 years, for the Next …

Read More »

Just One Device? No, Government wants Apple to Unlock 12 More iPhones

An illustration of an iPhone held up in front of the Apple Inc. logo taken of January 30, 2015 in Lille.  AFP PHOTO / PHILIPPE HUGUEN        (Photo credit should read PHILIPPE HUGUEN/AFP/Getty Images)

However, in addition to iPhone 5C belonged to San Bernardino shooter Syed Farook, the U.S. Justice Department is looking at court orders forcing Apple to help officials unlock at least 12 iPhones. Citing sources, the Wall Street Journal reported that the federal authorities want to extract data from iPhones seized …

Read More »

How to Hack a Computer from 100 Meters by Hijacking its Wireless Mouse or Keyboard

mousejacking-hacking-computer

No matter how secure you think your computer might be, something malicious can always happen. As a Computer is an open book with right tools and talent. The same is proved by a group of security researchers by hacking into a computer with no internet, and no Bluetooth devices. Yes, …

Read More »

Ricochet — Most Secure Peer-to-Peer Encrypted Messenger that Sends No Metadata

Ricochet-Secure-Messenger-1

There are several encrypted messaging apps for mobile and desktop platforms that shipped with “The Most Secure” tagline but ends up in de-anonymizing the real identity of its users in some or the other way. In fact, very few encrypted messaging apps available today deal with the core problem of …

Read More »

GM Bot (Android Malware) Source Code Leaked Online

android-malware-source-code

The source code of a recently discovered Android banking Trojan that has the capability to gain administrator access on your smartphone and completely erase your phone’s storage has been LEAKED online. The banking Trojan family is known by several names; Security researchers from FireEye dubbed it SlemBunk, Symantec dubbed it …

Read More »