Tweak your computer with registry hacks, Part 2: The Classes Root (in a bit...
It has been long time since I posted part 1 in the registry hacks series, and I hope you read it 10 times like you were suppose to. After much thought I’ve decided that I’ll continue the posts on...
View ArticleSamsung Galaxy S III, Note II, and other devices are vulnerable to hackers...
A serious security flaw has been found in one of Samsung’s Exynos chipsets, news that no Galaxy device user wants to hear. The flaw affects the Samsung Exynos 4, which means that Galaxy S III, Galaxy...
View ArticleIs Apple losing its touch? Major security hole allowed hackers to easily...
There was a time when Apple products were popularly recognized as being secure. Or at least more secure than the competition. For example, for the longest time Mac OS X was synonymous with “doesn’t...
View ArticleHacker develops Android app that can hijack airplanes
Hugo Teso is a security researcher at N.Runs, a Germany-based IT consultancy firm. He is also a licensed commercial pilot. So he did what any other regular person would do with two seemingly unrelated...
View ArticleUbisoft user database hacked, change your password now
The database of popular video game developer, Ubisoft, was recently accessed illegally by some hackers. Said database contains email addresses and passwords of Ubisoft users. According to Ubisoft,...
View ArticleNSA is accused of being behind malware that targets Tor users
You may have heard of the recent malware that targeted Freedom Hosting, a hosting provider for Tor, and Tor users. News is now emerging it may be the United States National Security Agency (NSA) that...
View ArticleHack lets you control a drone with Google Glass, and it looks awesome
Who would have thought that in the year 2013, folks would have the ability to control a drone by just tilting their heads all over the place? A developer, who goes by the name Blaine Bublitz, hacked...
View ArticleNew York Times website taken down by DNS hack, Syrian Electronic Army likely...
The New York Times website was down today due to a “malicious external attack,” with the group responsible alleged to be the Syrian Electronic Army (SEA). The attack involved redirecting requests from...
View ArticleSerious vulnerability found in Apple iOS devices and Mac OS X computers
Apple iOS devices are under attack, as a serious vulnerability in operating system allows degenerate individuals to crash apps on iOS 6 or even going as far as making these apps unusable. According to...
View ArticleGive your street a post apocalyptic look with Google Street View Urban Jungle...
If you’ve ever wondered what your street or your city looked like years after a post-apocalyptic event, then look no further than the Google Street View Urban Jungle hack. Rather than going with a...
View Article
More Pages to Explore .....