The Tor Project Is launching the Tor Bug Bounty Program
The Tor officially announced to launch the Tor Bug Bounty Program in the next year, a great news for the Tor community. The non-profit organization that is maintaining the TORRead More →
The Tor officially announced to launch the Tor Bug Bounty Program in the next year, a great news for the Tor community. The non-profit organization that is maintaining the TORRead More →
Former Sun VP and Linux Foundation CTO died under suspicious circumstances. Ian Murdock, founder of the Debian GNU/Linux distribution project, has died at the age of 42. His death, announcedRead More →
Palo Alto Networks unravels ‘BackStab’ technique which allows criminals to get access and steal your private data, via unprotected phone backups. The security company, Palo Alto Networks has disclosed details ofRead More →
North Korea’s homegrown computer operating system mirrors its political one – marked by a high degree of paranoia and invasive snooping on users, according to two German researchers. Their investigation,Read More →
Here at Gadget Hacks, we spend countless hours scouring the web to find the most interesting apps as they make their debuts, so the recent influx of new software hasRead More →
It doesn’t require you to buy a new copy of Windows. As happens from time to time, somebody has spotted a feature in Windows 10 that isn’t actually newand hasRead More →
Radamant ransomware v1 and v2 are now decryptable. Fabian Wosar, security researcher at Emsisoft, has managed to crack the encryption algorithm for the first two versions of the Radamant Ransomware Kit,Read More →
Researchers could not track down the database’s owner.Security researcher Chris Vickery has identified a misconfigured database that contains the personal details of 191,337,174 US voters. The unprotected database was discoveredRead More →
An employee of Russia’s Internet giant Yandex, Dmitry Korobov, stole the source code of its search engine and tried to sell it on the black market to fund his own startup,Read More →
Experts at Symantec discovered that hackers quickly take advantage of CVE-2015-8562 remote code execution to compromise Joomla servers. Joomla recently patched the CVE-2015-8562 vulnerability that could be exploited by attackers forRead More →