Oops! It appears that you have disabled your Javascript. In order for you to see this page as it is meant to appear, we ask that you please re-enable your Javascript!

Category: Hack

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.

John Mcafee Launches The Impressive Anti Spy & Privacy App “D-Vasive”

The Chicago’s CIO Synergy symposium John McAfee and Future Tense Secure Systems (FTC) informed about the official release of D-Vasive & D-Vasive Pro Anti Spy and Privacy app. D-VASIVE is the first ever hostile to spy application that guarantees complete security assurance to clients from obtrusive applications. The application will in a flash caution clients if any application endeavors to… Read more →

Does Mac OS X Yosemite Sends Search and Location Data to Apple?

Apple’s most recent working frameworks, ios 8 and Mac OS X Yosemite, gathers area and inquiry information and send it to Apple, as per a late revelation made by free specialists. It has been observed that the Apple’s most recent working frameworks are arranged to send area and inquiry information to the guardian organization at whatever point a client questions… Read more →

WireLurker: Apple Malware Infecting Mac and iPhone by means of USB

Macintosh is normally known for its first class security yet a US-based digital security programming engineer ‘Palo Alto Networks’ found another malware focusing on Apple items, for example, iPhone, iPad (iOS) and MAC (OS X). The name of this malware is “WireLurker.” It introduces pernicious outsider applications on ipads and iphones focusing on clients in China, however that doesn’t mean… Read more →

Twitter Got Hacked

The last week of tech headlines reads like some sort of cybersecurity end-of-days scenario. The New York Times hacked. The Wall Street Journal hacked. The Washington Post hacked. And finally on Friday, Twitter — one of the world’s largest Internet communication services — also hacked. “Who’s next?” you may be thinking. But the question to ask isn’t “Who’s next?” The question is, “Who will admit… Read more →

Cum poţi fi urmărit prin telefonul mobil

Telefonul mobil este una dintre cele mai importante invenţii şi este aproape imposibil să-ţi închipui viaţa fără el. Telefonul mobil a rezolvat atât de multe probleme, a uşurat viaţa atât de mult, afacerile sunt mai uşor de încheiat încât este uşor să uiţi de partea întunecată a telefonului mobil. Şi aici nu este vorba despre radiaţile mobilului.   Telefonul mobil este… Read more →

Facebook unveils social search tools for users

  Facebook has announced a major addition to its social network – a smart search engine it has called graph search. The feature allows users to make “natural” searches of content shared by their friends. Search terms could include phrases such as “friends who like Star Wars and Harry Potter”. Founder and chief executive Mark Zuckerberg insisted it was not… Read more →

A hacker who has learned what to make, and not just how to make, is extraordinarily powerful.

A hacker who has learned what to make, and not just how to make, is extraordinarily powerful.   Paul Graham   În timpul liceului mi-a plăcut foarte tare să particip la InfoEducaţie. (Pentru cine nu ştie, la InfoEducaţie vin elevi de liceu din toată ţara să-şi prezinte proiectele software personale – în general aplicaţii web, software utilitar sau educaţional.) Mi… Read more →