U.S. President Barack Obama signed an executive order that prevents Americans from doing business with North Korea. This is in response to the FBI finding North Korea responsible for a series of cyber attacks against Sony Pictures. However, there are Read the full article →
NSA Documents Show They Couldn’t Uncloak Tor
A series of documents revealed by Edward Snowden revealed that the National Security Agency attempted to reveal users on Tor’s anonymous network, but failed to do so. That is not to say Tor is completely foolproof, since the documents were dating Read the full article →
Is Tor a Playground for Criminals?
On the surface, Tor provides a welcomed service. Many people who don’t want to be bombarded and wish to keep their online activities private use Tor in order to have a more cloaked internet experience. However, is Tor hurting more than Read the full article →
The Facebook Scams of 2014
2014 had a number of malware and scams initiated through Facebook scams. Morbid videos of a woman dying and promises of nude videos of Facebook friends, opened the floodgates for Trojans to infect computers, laptops, and networks. For a full article Read the full article →
iDict Pierces Into iCloud
A hacker known as “Pr0x13†has released a password-hacking tool that can break into any iCloud account. The tool, dubbed iDict, can bypass restrictions and two-factor authentication security by exploiting Apple’s security infrastructure. For Read the full article →
- « Previous Page
- 1
- …
- 37
- 38
- 39
- 40
- 41
- …
- 127
- Next Page »