All You Need to Know about The POODLE Bug

All You Need to Know about The POODLE Bug

Google researchers have discovered a serious vulnerability in SSL 3.0- a widely used web encryption technology- that could be exploited by cyber attackers to launch “Poodle” attacks over the internet. According to Google’s security expert Bodo Möller the “vulnerability allows the plaintext of secure connections to be calculated by a network attacker.” Technically, a Security …

Read moreAll You Need to Know about The POODLE Bug

Microsoft Releases Experimental Android wear App

Microsoft Releases Experimental Android wear App

We all know how difficult it is to use voice recognition on our android wears especially in a noisy place or in a place where noise is prohibited and yet your smartwatch can’t pick up your whispers. Microsoft new release Analog Keyboard for Android Wear might be the solution to the problem. The App which is …

Read moreMicrosoft Releases Experimental Android wear App

Core Secrets: NSA undercover Agents Spying on China, Germany and South Korea

Core Secrets NSA undercover Agents Spying on China, Germany and South Korea

US National Security Agency have made headlines again, after Snowden’s latest leaked documents revealed the Agency had undercover agents in China, Germany and South Korea. Document obtained by The Intercept revealed the undercover operatives used “Physical subversion” tactics to infiltrate and compromise networks and devices. “The documents, leaked by  former NSA agent Edward Snowden, also …

Read moreCore Secrets: NSA undercover Agents Spying on China, Germany and South Korea

The Snappening: Thousands of Nude SnapChatters’ Photos Leaked Online

The Snappening Thousands of Nude SnapChatters Photos Leaked Online

The Snappening is real, tens of thousands of private photos and videos have been leaked online. The leaked files were reportedly stored secretly by a third party Snapchat client App. Initially, the Snappening was rumored to be a hoax, before the Daily Beast confirmed that over 190,000 photos and 9,000 video hacked allegedly from a …

Read moreThe Snappening: Thousands of Nude SnapChatters’ Photos Leaked Online

White House Cybersecurity Czars want Selfies to Replace Passwords

Passwords could soon be a thing of the past, if Whitehouse adopts Michael Daniel suggestion to kill Passwords and replaces them with selfies. Speaking at Event dubbed “Building a Cybersecurity Roadmap: Developing America’s Edge” –   hosted by the Monitor and The Center for National Policy, Michael Daniel, the cybersecurity coordinator at Whitehouse said selfies …

Read moreWhite House Cybersecurity Czars want Selfies to Replace Passwords

How to Find a Truly Trustworthy VPN Online

The use of a Virtual Private Network has been embraced worldwide, due to the significant benefits that it can offer. Being able to mask your IP and surf the web anonymously is not a petty issue, and with so many online threats this has been quite a blessing for the global computing community! There are …

Read moreHow to Find a Truly Trustworthy VPN Online

12 year old Chinese Hacking Prodigy joins the League of World’s Youngest Computer Hackers

Wang Zhengyang, a 12 year old Chinese “computer whizzkid” may be the youngest hacker in China. Wang broke into his school computer system and a shopping website but claims he was only looking for flaws. Wang hacked into his school system then notified the software company that offered this same software to other schools. “I …

Read more12 year old Chinese Hacking Prodigy joins the League of World’s Youngest Computer Hackers

What is Tor Proxy and Whether You Should Use It or Not

Tor is actually an open network and free software, aiming at camouflaging your IP and providing you with a secure pathway to the Internet.  Standing short for The Onion Router, you can see where its logo of an onion came up. Indeed, Tor encrypts your data using multiple layers of security and therefore offers you …

Read moreWhat is Tor Proxy and Whether You Should Use It or Not

What are the Different Protocols used in VPN Connections

Now it’s crystal clear that he daily use of internet requires an online protection, so the user could be saved from the online oppression. A VPN service uses a set of procedures which is called a “VPN (or Virtual Private Network)  Protocol”. The restriction and strong encryption a VPN uses including a private data access, …

Read moreWhat are the Different Protocols used in VPN Connections