|Iran halts nuclear talks after US blacklist move||
The Iranian negotiators interrupted the talks with the P5+1 for consultations in Tehran," a negotiator told Iran's official IRNA news agen
|Iran fears Assassinations, cyber-attacks and possible military strikes||
Assassinations, cyber-attacks and possible military strikes: As nuclear negotiations with Iran enter a crucial stage, Tehran is voicing fears
|Hacker Sentenced for attempt to sell access for $50,000 to two supercomputers||
A Pennsylvania man was sentenced to serve 18 months in prison for his role in a scheme to hack into computer networks and sell access to those netw
The role of Google – which has developed into an Internet giant whose services 100s of millions of people around the world use every day &nda
|U.S. network security management evaluation report By Chinese||
The Following Article is a evaluation report by Chinese e-government network on United State network security management with interesting conclusio
|Will Iran's Covert War Continue?||
They say old habits die hard.
|The Pirate Bay moved to the domain of the island in the Atlantic Ocean||
Torrent tracker The Pirate Bay has moved to domain. Ac, highlighted located in the Atlantic Ocean volcanic island of Ascension.
|China hacked Five EU Ministry computers around G20 summit||
Chinese hackers broke into computers of the Ministry of Foreign Affairs of five European countries just before the G20 summit in St.
|@SnoopDogg goes Cyberdronage & will make his next record available for bitcoin purchase||
My new album will be deployed by my Drone, dawg but only when you paid with bitcoins my double g.
|Cyber Criminals crack supposedly "safe" mTAN procedure||
For years, bankers praise the so-called mTAN procedure as safe.
|iSPY: Apple Stores switch on iBeacon phone sniff spy system||
Apple has switched on its controversial iBeacon snooping system across 254 US stores.
|Anonymous Origami Guy Fawkes Mask||
Did you know you can create your own Anonymous Origami Guy Fawkes Mask in a couple of steps?
|Requesting your own NSA record, like the Dutch did||
In The Netherlands the population is demanding their personal records from the intelligence service AIVD.
|Playing online games in the name of national cyber security||
The NSA and GCHQ are active on MMORPG games like World of Warcraft and Second life.
|Former Senior CIA Officials; Iranian authorities were able to expose American operatives||
Several years ago, a senior officer in the CIA clandestine service attended a closed-door conference for overseas operatives.
|Israel's Shimon Peres Willing to Meet Iran's President Rouhani||
Israeli President Shimon Peres told the 2013 Israel Business Conference in Tel Aviv that he would like to meet with Iran's President Hassan Rou
|Viewpoint: Deciphering The Direction Of Iran's New Foreign Policy||
fter the limited nuclear deal Iran reached with the United States and other world powers in Geneva, the quintessential question is whether Tehran i
|NSA defends global cellphone tracking as legal||
The National Security Agency on Friday said its tracking of cellphones overseas is legally authorized under a sweeping U.S. presidential order.
|Iran presses ahead with uranium enrichment technology||
Iran is moving ahead with testing more e
|Snowden to make video appearance at EU parliament||
Former US intelligence contractor Edward Snowden is set to make a pre-recorded video appearance at the European Parliament’s civil libe
|New Snowden leak reveals U.S. espionage in Rome and Milan||
An article published Friday by one of Italy’s most prominent news magazines details the efforts of the United States to spy on Italian citize
|News Analysis: Iran seeks to mend ties with world as deadlock eases||
Iran's diplomatic campaign to improve relations with the world is gaining momentum after an interim deal broke the decade-long deadlock on its
|Padvish Iranian indigenous antivirus unveiled||
The first Iranian indigenous antivirus has been unveiled in Iran Elecomp 2013.Mehr News reported that the developer of the antivirus had said it wo
|Cyber warfare – Why we need to define a model of conflict?||
Cyber warfare or information warfare is still a gray area of the military doctrine, it is necessary to define the "model of conflict" and
|[SCAMMED] Nottingham teenager gets £450 refund after buying a photo of an XBox One on eBay||
A teenager has received a full refund after
|Ukrainian police clashes with mobs - 30 cops vs 1 guy||
Violent clashes between police and protesters in Ukraine have been the focus of much attention recently.
|10 times more throughput on optic fibers||
EPFL scientists have shown how to achieve a dramatic increase in the capacity of optical fibers; Their simple, innovative solution reduces the amou
|eBay Founder Pierre Omidyar Calls for Leniency for Anonymous 'PayPal 14' hackers||
The group, which has become known as the 'PayPal 14' were arrested in 2011 and charged with taking part in a distributed denial of service
|1.5 Million euro stolen & 13 people detained in the Russian Blackhole exploit kit case||
Russian Ministry of Internal Affairs Investigation Department initiated a criminal case on the Cc Article 1.2. 210 of the Criminal Code o
|Google Fail: How Morgan Freeman got confused for Nelson Mandela||
Ohh - the horrors of the internet have hit the Google search keyword "Nelson Mandela RIP" you will get the face of Morgan Freeman saying