Tag Archive


Android Apple Apps App Store BlackBerry Earth Facebook Google Google Chrome hackers Informative Report International Space Station Internet iOS iPad iPhone iPod iTunes malware Mark Zuckerberg Microsoft Microsoft Windows NASA planets Privacy Robotics Samsung Science scientists security Smartphone Smartphones Social Media Social Network Sony Space spacecraft Steve Jobs Tablets Technology Twitter United States Wi-Fi Windows youtube

CryptoLocker virus holds your computer for ransom

A malicious new virus called ‘CryptoLocker’ is encrypting important computer files around the world and then demands the owners pay up to unlock them. A flashing ransom note pops up on your screen and says you have 72 hours to in which to pay, or the files will be permanently deleted. A countdown clock indicates how much […]

Security researcher says new malware released can affect your computer’s BIOS.

A prominent security researcher says he has discovered a new version of malware that can adversely affect some of the lowest levels of your PC. What’s even more notable, this new piece of code could actually be the first example of an airborne computer virus. Not via Wi-Fi downloads but input from signals converted into code by your laptop’s […]

Chinese hackers target Apache servers running Struts applications

Hackers located in China are using an automated tool that exploits known vulnerabilities to install backdoors on servers hosting Apache Struts applications.  Apache Struts is a popular open-source framework for developing Java-based Web applications that’s maintained by the Apache Software Foundation. Several security updates were released for Struts this year to address highly critical vulnerabilities that could enable remote attackers […]

Hackers can reportedly control almost all Android phones

According to a recent BlueBox Security report, most, if not all Android devices are vulnerable to hacking or being completely taken over remotely by cyber criminals. Mobile security BlueBox claims it has discovered a flaw in the operating system of almost all Google phones and tablets allows hackers to modify its code in a way that “turns any legitimate application into […]