lock_t

Andrognito is a free Android app that uses a 3-step algorithm to hide and encrypt files.

Read More

 

WorldPasswordDay

As part of World Password Day earlier this week, McAfee and its partners started an effort to help educate consumers worldwide on the importance of password safety in the wake of the multiple global security breaches.

Read More

 

SecureGmail Encrypt Email

In light of the currently en vogue privacy debate raging all around the world and given the flippant stance of many of our often used communication platforms with regards to securing its users’ privacy, it is becoming more and more evident that if the user wants privacy online, he’ll have to snatch it, for it […]

Read More

 

Nokia-logo

Nokia uses its Nokia/Ovi proxy servers pretty much the same way any other browser manufacturer uses its proxy servers — for transcoding, resulting in data compression and faster browsing.

Read More

 

While BLAKE2 is advocated as being a secure hashing function, it is also as fast as MD5, which might be a reason for concern, but the developers of BLAKE2 have said on their mailing list that BLAKE2 has better security.

Read More

 

Exynos 4 Quad

An XDA member has discovered a kernel level security exploit in Samsung Exynos 4 based devices that can easily allow an app to gain root access to your device, along with access to the RAM.

Read More

 

user data

If the Government wants user data so badly, there has to be proper accountability. This is exactly the kind of big-brother surveillance that people resent, and guess what! It has never been easier for the Governments, with all these online services curating more data than ever available earlier.

Read More

 

A serious flaw has been discovered that allowed anyone to basically login to other’s Facebook account without the need of a password.

Read More

 

House Intel Logo

A U.S. House of Representatives intelligence report suggests the U.S. should cut off relations with two of China’s top telecom manufacturers Huwaei and ZTE.

Read More

 

keith-alexander

The hack is so popular; it has become the most visited Pastebin paste ever, within 24 hours. However, it also raises questions. What is the FBI doing with 12 million Apple UDIDs?

Read More

 

java

New Java vulnerability allows attacker to escape sandbox and execute arbitrary code on affected systems.

Read More

 

images

Russian security firm Dr.Web has identified a new Trojan named BackDoor.Wirenet.1 which runs on both Linux as well as Mac OS X. This is the first ever cross platform Trojan that has been discovered to affect both of the aforementioned operating systems.

Read More

 

Java

The exploit has been successful in installing a variant of the Poison Ivy trojan. It is originating from servers in China and Oracle has not yet treleased any statement on fixing the exploit.

Read More

 

136px-US-FBI-ShadedSeal.svg

FBI has released details of an international operation directed at curbing card crimes. The operation, which is said to be the largest aimed at curbing card crimes, lead to the arrest of 24 individuals in 13 countries among which, 11 are from US.

Carding crimes include stealing of personal information such as credit card details, social security numbers, bank account details etc. and using them or selling them in order to make money.

The operation was a result of a two year undercover operation lead by the FBI. Of the 11 arrested outside US, 6 are from United Kingdom, 2 from Bosnia and 1 each from Bulgaria, Norway and Germany.

Read More

 

Blizzard addresses rising concerns about Diablo III accounts being hacked.

Read More

 

1 2 3 4 5 6 14
 
Copyright 2006-2012 Techie Buzz. All Rights Reserved. Our content may not be reproduced on other websites. Content Delivery by MaxCDN