Google warns Microsoft and Apple: fix the vulnerability or we will disclose

  Google said that its elite team consisting of hackers and programmers search security deficiencies of its software applications and other companies, Google warning that if its competitors will not eliminate vulnerabilities within 90 days, then they will make public. Google claims that software vendors must act quickly

Facebook vulnerability allows deleting any photo

This vulnerability allowed (it was fixed recently) malicious users to delete any photo album available on Facebook. This exploit of the Facebook Graph API allowed hackers to delete any photo album owned by a user or a page or group from Facebook. The main utility of the

EERO, the device that will completely change your wireless home network. New Eero wants to wipe out weak Wi-Fi

  It is true that you will not find a router that is perfect, even if you pull out of your pocket a larger amount of money, because you consider that does not justify the acquisition and the quality – price, but for an ordinary user in

Swatch releases their first SmartWatch

Swatch Swiss company has recently announced that will release in the two to three months a smart watch and the information was extensively commented on the Internet. The big question is whether this watch will be a success or a will be failure. Well, opinions are divided.

How it will look the new iPhone7 and what features will have

  Apple has not announced the release date for the new generation of  iPhone, so the specialized press is plenty of room for speculation and scenarios. If Apple will launch iPhone representatives 6S, the new iPhone will have some improvements compared to the already out on the

Anthem, an insurance company, was the target of a large cyber attack

  Anthem Insurance Company, the second largest in the United States, was the target of a cyber attack, hackers managed to steal personal data for many former or current clients and employees of the company, reports Reuters. Anthem announced Wednesday that hackers broke into an IT system

HHVM vs PHP 5 battle. HHVM is much faster

HHVM vs PHP is a battle that you should consider. Which one is more faster. Is HHVM more performant than PHP? Does HHVM consume less CPU than PHP? Which one is more stable and which one could be used in production? These are questions that might get

Cloud, a new era of innovation for personal data protection

  A sophisticated cryptographic algorithm prevents unwanted distribution of personal data, including credit card details. IBM researchers have recently announced their intention to develop a technology based on cloud platform that will help users, giving a better protection for their personal data, when they are online, including date of birth,

USBdriveby can take control of a computer in a few seconds

  A few months ago was discovered a worrying  vulnerability of standard USB  which does not seem to be repaired, called BadUSB. Until now such information was only theoretical and no one has developed a software which can uses this security hole, but a well-known hacker Samy Kamkar has

2014 Security News Review

In this article you’ll find the hottest hacking news from 2014. Below you’ll find the most important security news for each month of 2014. All titles are selected from our hacking news blog. We hope you enjoyed reading these news and we assure you that better quality