“You just got pwned!” In the gaming world, pwn is a leetspeak term for dominating a rival. However, nowadays, pwn is associated with hacking. Being pwned is being compromised. It may

“You just got pwned!” In the gaming world, pwn is a leetspeak term for dominating a rival. However, nowadays, pwn is associated with hacking. Being pwned is being compromised. It may
Apple launched its new iPhone X a few months after celebrating 10 years of the iPhone. The new phone model has a new facial recognition feature called Face ID. Face
Last year, black hat hackers launched a total of four billion cyber attacks. That was five times greater than the cyber attacks in 2015. Across the world, damages from cyber
Since the advent of the Internet, the world wide web has become an open marketplace. Businesses, personal, and social networking sites have appeared online. There are websites that are openly
Adobe announced late July that they will stop supporting Flash by the end of 2020. As we all know, Flash used to be a standard tool for web development. That
With the recent hacking on HBO plus the WannaCry and NotPetya ransomware attacks a few weeks back, you couldn’t help but ask how vulnerable a software can be. In this
While the United Nations stands up for freedom of expression and declared “that people have the same rights online as offline”, a few countries are experiencing the opposite. While the
When we say open source software, it means that a programmer can alter it. Its design and source codes are available and accessible for revisions. Open source denotes open exchanges,
Last week, the Senate voted for the repeal of the Internet privacy protections approved by the FCC several months ago. These rules would have required ISPs to get permission from customers
You probably sent an email via Gmail, logged in to Facebook, or paid someone via PayPal. You’re confident that those actions were safe. They were, really. Because these sites use