How Anti computer hacking bill Processed

>> Saturday, February 12, 2011

Strengthening cybersecurity is the goal of legislation being introduced in Congress after reports of hack attacks on computer networks at Nasdaq OMX Group and at oil and gas companies....

Read more...

U.S under Cyber warfare threats

The cyber warfare threat facing the United States is increasing in scope

Read more...

US oil companies got attacked by Chinese hackers

Hackers from China have penetrated computer networks of global oil companies, stealing financial documents on bidding plans and other confidential information, a US computer security firm said Thursday....

Read more...

PS3 Hacker aims against Sony !!!

According to Wired, famed Playstation 3 hacker George “GeoHot” Hotz must turn over the tools of his trade and allow Sony to sift through his computer’s hard drive...

Read more...

How security loophole expose Twitter

>> Thursday, February 10, 2011


A security loophole in Twitter can give website developers easy access to users' private direct messages, messages that are exchanged between two people and not meant to be shared on Twitter or with anyone else, according to a report....

Read more...

How iPhone passwords Hacked in Six Minutes

IPhone has been lost or stolen can be a terrible experience. Not only do you have to deal with replacing the device, but you also have to worry about someone accessing all the personal information you've got on the gadget....

Read more...

Sikkim govt website got Hacked to register protest

>> Tuesday, February 08, 2011

A Kashmiri group has allegedly hacked the Sikkim government web site. Hacker hacked web site not for any benefit but to register a protest against the alleged violence in Kashmir....

Read more...

Password Stealing with Cookies

>> Monday, February 07, 2011

Computers are one of the media to explore cyberspace. In the computer are some informations that we can learn, especially recovering confidential information stored on the computer. One of them is a username and password to run commands on a web. Typically, the important information is stored in a file named Cookie.... 

Read more...

Protect you Password from Hackers

Protect your yahoo account and every account in general and should not be used for stealing someone's info, password etc...

Read more...

Password Cracking

>> Saturday, February 05, 2011

The problem lies with the ever increasing abilities of computers to process larger amounts of data in a smaller amount of time. A password is just a string of characters, typically only keyboard characters, which a person must remember and type into a computer terminal when required....

Read more...
Related Posts with Thumbnails

  © Blogger template Webnolia by Ourblogtemplates.com 2009

Back to TOP