WebCam as Security Camera [DIY]
Surveillance systems can relieve your worries, but, they can also relieve your wallet. Why fall for expensive equipment when you can build your own at Fraction of cost ? You can use a cheap Web … Read more
Surveillance systems can relieve your worries, but, they can also relieve your wallet. Why fall for expensive equipment when you can build your own at Fraction of cost ? You can use a cheap Web … Read more
The end of Internet Explorer is finally here. Series of events: Google Hacking, removal of support for Google apps, several other vulnerabilities are forcing users to move to alternates. Recently, at Black Hat DC conference, … Read more
How many times did you lose patience over unlocking your windows machine with your long-passwords and how many times you ahted it when you had to share your password for use by your roommate? Well, … Read more
There exists an encryption that has been left UnBroken since 1942 approximately time around the World war 2. This is called security — when encryption algorithm lasts long, really long. Unfortunately, Microsoft has a different … Read more
Chinese hackers changed the face of Internet forever by taking the wrong step — trying to hack the search giant and several other giants. Apparently, we know that hackers exploited a Vulnerability in Internet Explorer, … Read more
Google has long offered the ability to use a secure connection with Gmail via settings or using https:// in the URL itself. Now Google has defaulted it to https connection. I don’t know about the readers, … Read more
Internet faced World Wide Panic as Twitter.com was defaced to run out of service. Soon after the attack Users were able to see a page that claimed work of “Iranian Cyber Hackers”. In simple words, … Read more
Wireless Networks have long been a threat to our network security. Security freaks know it that breaking a wireless WEP network takes couple of seconds. All it takes is to capture those IVs and calculate … Read more
Who was that someone shouting loud that only Jailbreaking makes iPhone insecure? We now have a new App that makes even an UnModified/Virgin iPhone leak personal data like you have never seen before. A Swiss … Read more
WiFi is a must in every smartphone, but Today’s report brings bad news for enthusiasts who use WiFi excessively for their daily online interactions. The list of vulnerable devices is huge: Nokia N95, HTC Tilt … Read more
UAC or User Access control force program execution to go through user permissions. This is one feature that was improved in Windows 7 to reduce the annoyance caused in windows Vista. But now as per … Read more
As reported by large number of sources, a Dutch hacker hacked a user’s Jailbroken iPhone and locked it unless it pays a mentioned amount to the Hacker. A Proof of concept comes from the Forum … Read more
NASA might have made significant discoveries in the deep space, their security has been breached 1100+ times within last 2 years. Being the hottest space mission organization, NASA has faced several hacking attempts, both with … Read more
Earlier, back in the 90s when I first dated the Internet, I found credit cards were easy to exploit. It was as easy as getting a software that auto-generates numbers that could be used to … Read more
HTML 5 comes with alot of promise for the web. It has lot of new features that could make Web Browsers and Apps much more powerful than they ever were. Let’s go by an example. … Read more