The great place to get up-to-date with the latest technology.

Sophos Shuts Down Partner Portal After Discovering Hack Tools

The world renowned security firm Sophos has revealed that its Partner Portal has been temporarily taken offline after a couple of “unauthorized programs” were found on the server. It’s believed...

Romanian Government Portal Defaced by Anonymous, President Mocked

The Public Information Portal (publicinfo.gov.ro), a website owned and managed by the Romanian government, was breached and defaced by members of Anonymous. The main page of the website where...

Sony Hacker Pleads Guilty, Faces 15-Year Sentence

24-year-old Cody Kretsinger, former member of the LulzSec crew, known on the hacking scene as recursion, pleaded guilty in front of a US District Court judge for breaching the systems owned...

iPad 3 Get Torched by Lasers (Video)

Kip Kedersha (KipKay on YouTube) is showing off one of his latest projects, if you can call it that, which involves the third-generation iPad, a bunch of lasers, a Flash Torch, and the Solar...

Flaw in Facebook and Dropbox Mobile Apps Allows Data Theft

Security expert Gareth Wright identified a security hole in the iOS version of the Facebook app that could allow someone with ill intent to steal user credentials. After further analysis, the...

Scammers Target Facebook Users in Polymorphic Attack

Malicious Facebook advertisements usually lead users to survey scams, pieces of malware, phishing sites and other types of dangerous cybercriminal schemes. However, Bitdefender experts came...

Google Awards $6,000 (€4,500) to Experts for Finding Chrome Vulnerabilities

The Beta and Stable channels of Chrome, Google’s popular browser, have been updated to version 18.0.1025.151. With this latest update, a number of improvements in the security sector were also...

Twitter Takes Biggest Spammers to Court

Twitter spam isn't much of a problem, in the sense that it's not a bigger problem than in other places online, but it exists and most users encounter it from time to time. Twitter has been doing...

Hacker Claims Breach on Chinese Military Contractor CEIEC

A hacker that calls himself Hardcore Charlie claims to have “owned” CEIEC, China National Electronics Import-Export Corporation, a company that’s believed to be connected to the Chinese military.“Today...

More Windows 8 Post-Beta Details Emerge

Microsoft is well underway with the development of the next flavor of its Windows 8 platform, expected to land in the next few months as a Release Candidate. Currently in post-Beta stage, Windows...

How to Make Your Own iOS Games

“Featuring a @SteveWoz intro, Tap, Move, Shake will show you how to make your own #iOS game,” reads the latest tweet from Apple through the @iBookstore Twitter handle.The company run by Tim...

How to reinstall OS X after malware infection

While instructions are available to remove the latest malware threats for OS X, some may choose to simply reinstall OS X and start from a clean slate.The recent Flashback malware for OS X has...