I’m a Cold War kid. I grew up watching news of Pershing II and SS-20 deployments in Europe, the Soviet war in Afghanistan, with some Terminator and Top Gun VHS action on the side. Yugoslavia was trying to play both sides, and for a while it worke...
Bluetooth Fitness Trackers ‘Threat to Privacy’
The popular Bluetooth Low Energy (BLE) beacon protocol isn't just a privacy risk up close it, pointing to the potential for fitness trackers to be hacked. Scott Lester, a researcher at Context, has uncovered a concept known as Bluesniping, which ...
Google Developing Lightweight Android OS 'Brillo' for Internet of Things
Google developing aA lightweight version of mobile operating system for Android, that is called as Brillo. It is targeted at low-memory devices with 32 or 64MB of RAM. Google is expected to launch the code for the new operating system next week ...
Amazon seeks US permission to test Prime Air delivery drones
It is Glastonbury 2024, and you've got a front-row spot for the headline act, the Rolling Stones, concluding their fifth farewell tour. You need a drink badly, so you get out your smartphone and dial up a drone, which within minutes delivers a pla...
Adobe Patched Up the Gaping Security Flaw
Adobe released Flash security update on Tuesday morning to coincide with a technical analysis of the threat, including proof-of-concept exploit code. The flaw is it possible for hackers to steal the cookies that authenticate returning users on s...
iOS 8 Security and Privacy Updates
iOS 8 is the eighth major release of the iOS mobile operating system designed by Apple Inc. as the successor to iOS 7. It was announced at the company's Worldwide Developers Conference (WWDC) on June 2, 2014. The latest updates to iOS 8 and OS X ...
International Analysis: Making Sense of Heartbleed
The announcement on April 7 was alarming. A new internet vulnerability called Heartbleed could allow hackers to steal your logins and passwords. It affected a piece of security software that is used on half a million websites worldwide. Fixing i...
Untethered iOS 7 jailbreak coming for iPhone, iPad, and iPod devices
After Three months Apple rolled iOS 7 out to the public, an untethered jailbreak tool that's compatible with the new operating system has been made available. It’s been a long wait for those that like to tweak their phones; previous jailbreaks on...
NSA uses Google Cookies to Pinpoint targets for Hacking
The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using 'cookies' and location data to pinpoint targets for government hacking and to bolster surveillance. The agency's inter...
iCloud Keychain and iOS 7 Data Protection
Apple announced iOS 7, iCloud Keychain was one of its key features. It is no doubt great for usability, but what about security? What kind of access does Apple have to the passwords stored in the iCloud? Andrey Belenko from PasswordsCon Bergen 20...
Android App Stealing and Selling WhatsApp Conversation
According to security expert Graham Cluley, the information harvested by the app is uploaded to a site called WhatsAppCopy. On this website, cybercriminals can enter the phone number of an Android device and gain access to private conversations f...
Beginner’s Guide for “Crypto” to Keeping Secrets
Crypto is one of the more advanced topics of information security, and one whose understanding requires the most schooling and experience. It is difficult to get right because there are many approaches to encryption, each with advantages and disad...
Cryptophones are Cannot be Tapped
Crypto phones are mobile telephones that provide security against eavesdropping and electronic surveillance.The interception of telecommunications has become a major industry. Most of the world's intelligence agencies and many private organisation...
Google's New Project Loon
Project Loon is a research and development project being developed by Google with the mission of providing Internet access to rural and remote areas. The project uses high-altitude balloons placed in the stratosphere at an altitude of about 20 km ...
LG Smart TV Spying on Users
The British Developer and blogger DoctorBeet, announced to have discovered that his LG Smart TV is sending data about his family’s viewing habits back to the South Korean manufacturer.one year ago we discussed about the possibility to exploit a vu...
How to Check the iPhone Applications
If you want to test or validate different types of fascinating applications, but also get aware of their technical requirements and designs. Applications need to be tested on every available platform to verify its compatibility and functional issu...
US Military Experimental Flying Platform from 1955
This US Military Experimental Flying Platform from 1955 is like a flying Segway. I wonder how long it will be before we have a modern day version of this. With technology that is becoming common place because of devices like the AR Drone I think th...
How To Make Android Application
Step 1: Get Eclipse For this tutorial, I’m going to use Eclipse, because frankly it’s the easiest and most hassle-free development tool for Android right now. If you’re a NetBeans programmer, be my guest; but I’ll use Eclipse today.Download Eclip...
7 NEW Technologies Coming .....2012
Hey friends here m discussing about the 7 new technologies coming up in 2012.As we know technology world changes each n every moment. In 2011 many new smartphones came, tablets n new techniques came into techno world.In 2012 which techno trends ...
Socialize