- Apple finally unveils the new iPad Air Read more »
- Google's Nexus 5 is rumored to be launched this Novembe... Read more »
- Microsoft Offers Another $100 Discount to their Origina... Read more »
- Lenovo Desktop PC Doubles as a Large Tablet Read more »
- Robotic Vehicle Gets Wheelchair Bound Person to Stand U... Read more »
- Human-Powered Roller Coaster Offered in Japan Bicycle T... Read more »
- Analog Camera Filter for DSLR Cameras Offers Instagram-... Read more »
Defend your computer from all forms of cyber attacks through following these basic tips and precautions.
Since computers have been the best platform for doing a lot of things – from school matters to professional tasks – it is quite important for you to protect your files and accounts from different online threats such as Keyloggers, Hackers, and Cyber Terrorists.
To date, the level of cyber crimes has been constantly increasing, resulting to a big problem for your defenseless computer systems. If you are not aware of how to defend your computer, then perhaps hackers might easily break into your system without getting your attention. Follow the steps posted after the cut to make sure your computer is safe from Cybergangs.Read the rest of the article »
Seven simple steps on how to create a strong and secured password for your personal or email accounts.
Most Internet users often use passwords that are too basic, such as their surname, birth date, or child’s name. What they don’t know is through that way, they are letting cyber hackers attack their personal accounts easily. Without using any special tools, a hacker may try out all potential passwords, which could be their basic information.
In order for you to create a notable yet secured password, you must follow the steps posted after the jump.Read the rest of the article »
Infographic entitled Hack Attack shows the top Lulzsec attacks, hacking statistics, black and white hackers, and password hacking times.
Nowadays, the number of hacking attacks have been obviously increasing — affecting websites that have no strong securities. Some known groups behind these assaults are Anonymous and Lulz Security (Lulzsec), who had just retired from their job as hackers but still encouraging other people to continue what they have started.
As a way of safeguarding innocent online brands and discussing the vital statistics of such hacking groups, Gadgets and Gizmoz recently created an infographic entitled “Hack Attack”.
Hit the break to see the infographic.Read the rest of the article »
Anonymous, a group of hackers has taken down a Turkish government website as protest against recently introduced Internet filters which many consider to be censorship.
Anonymous took down Turkey’s Telecommunications Communication Presidency (TIB) website as protest against censorship. The website is still inaccessible at the time of this writing.Read the rest of the article »
Following Sony's numerous security breach reports, Google is patching up any vulnerabilities on their Android handsets.
Due to the rise of numbers of hackers worldwide, Google’s Android team is going to release a platform fix to patch a security breach which leaves users’ personal information wide open to the hackers. Google told All Things D on Wednesday that “this fix requires no action from users and will roll out globally over the next few days.”
In a recent research conducted at the University of Ulm in Germany, it was found that almost 99% of Android handsets may be leaking its user’s login information when applications connect to Google’s servers through unencrypted WiFi networks. It then gives access to the user’s contacts, photos, calendar, and more. Handsets that are vulnerable to this sort of attack are those running the Android version 2.3.3, as well as the earlier versions.
An advice to Android users who have not yet updated or cannot update to version 2.3.4 is not to connect your handset to unsecured networks, until Google has released the said security patch.View Article Source »
Sony PSN apocalypse continues, as hackers claim possession of PSN users' credit card data.
Looks like Sony’s worst nightmare has finally come true. Well, at least in the realm of Rumorville. A group of hackers, who claims to be the ones behind the PSN (PlayStation Network) security breach, has recently announced that they now possess the credit card numbers of the service’s users.
According to their posts in an underground hackers forum, the hackers claim to have infiltrated into Sony’s main database. Meaning they have access to not only customer names, addresses, usernames, and passwords, but also access to 2.2 million credit card numbers.
So how screwed are the PSN users? Yeah, they’re pretty much screwed.Read the rest of the article »
PSN's going back into action within a week, but for only "some services." Devs urged to get new SDKs for new security features.
Sony has recently announced through their blog that “some services” of the PSN (PlayStation Network) will be go back online within a week. The company did not specify what these “some services” are, but at least people got something.
Sony also urged some developers to acquire and install the new SDKs on their PlayStation 3 dev kits. The new SDKs will include new security features in light of the recent attacks on the PSN service, which has sent Sony and all its denizens into a state of discord after learning that private information – such as billing addresses, usernames and passwords – have been compromised. Sony has assured though that credit card information was not breached, explaining that the database was encrypted and there have been no evidence that it has been hacked.Read the rest of the article »
It’s amazing how Internet has evolved from a military project to a world wide phenomenon. And yes kids, there was a time when there was no internet. Consider yourselves lucky that doing homework, research, shopping, dating, and Family Guy episode viewing can be done with a couple of keyboard actions and a click of a mouse. Although it does have its downsides as we’ve been introduced to the horrors of Justin Bieber and Rebecca Black.
Although the history of the internet can fill up an entire book as long as one of Tolkien’s Lord of the Rings book, the Grasshopper Group managed to concoct a short and sweet infographic to somehow explain the chronology of the technology even for people with the shortest of short term attention span when it comes to reading.
Hit the break to check out the “Awesome Evolution of the Internet.”Read the rest of the article »
A Senior Corporate Counsel and a Senior Paralegal for Anti-Piracy and Brand Protection titles aren't only a mouthful, they're Sony PlayStation 3's first line of defense against piracy as well.
With a legal battle down the drain (is it?), an improved firmware, a protocol to ban all pirated PlayStation 3 consoles from the PlayStation Network, Sony’s taking additional precautions against piracy by forming two new positions that will deal with the matter, a Senior Corporate Counsel and a Senior Paralegal for Anti-Piracy and Brand Protection. Both have the main responsibility in “assessing annual SCEA corporate anti-piracy needs and addressing the needs through developing and implementing an anti-piracy program.”Read the rest of the article »
Sony bares its fangs as it officially charges copyright infringement lawsuit against PlayStation 3 jailbreakers Geohot and fail0verflow.
Sony finally got the message when a Temporary Restraining Order won’t be enough to stop jailbreakers from hacking the PlayStation 3. And now they’re landing one of their trumph cards as they officially and legally file a complaint against jailbreak superstars Geohot and fail0verflow for copyright infringement.
The full legal document is over 40 pages long. But in a nutshell, Sony’s charging the hackers for copyright issues and are asking the court to halt the hackers’ operation over the internet and to confiscate all hardware and software that contain the jailbreak code. On top of that, they’re asking for damage fees, but as to how much, it doesn’t say. There are no statements yet from Geohot and fail0verflow.Read the rest of the article »
Written on January 03, 2013
Written on December 28, 2012
Written on December 21, 2012
Written on December 17, 2012
Written on December 17, 2012