Bioweapons lost in France: 2300 pieces gone missing

In the world of European medical research, few names carry more clout and prestige than the Institut Pasteur. In 1983, the French non-profit discovered HIV, and three years later found another strain of the disease. It has posted groundbreaking research in the study of diseases from yellow fever to tetanus to diphtheria. In all, its scientists have netted numerous Nobel Prizes, one of which came in 2008.

MUST READ: Command and Control servers list used by cybercriminals

Each day there is news about how cyber criminals launched a DDoS attack or successfully stole big amounts of money - these criminals are able to perform these tasks because they own a massive army of infected clients which are being used to perform criminal activities. All of these computers are controlled by command and control servers which are managed by cyber criminals. Command and Control servers are often installed on hijacked servers which are the perfect place for a cyber criminal to hide and manage their infected clients. 

Windows Hacking Tool - FREE DOWNLOAD

Take control of each Windows operating system with the CWZ CYBERWARZONE: Windows Hacking tool which you can download for free. This tool is equipped with a TCP Port scanner which will allow you to scan each port that you wish to scan. The program also allows you to take a look at the current IP which you are having, it allows you to find passwords installed on the system and much more. 

Human Autonomous Zones - The Real Role of Hackers

How the role of hackers in society has changed. They used to be a necessary counterbalance to corporate and government power. Now, it's more like hackers are the only ones who understand the technology. They have become a balance to the power of technology itself. A discussion by renowned author Doug Rushkoff.

Hacking a $20 Toy Helicopter into an Autonomous Drone

Have you ever wanted to build a autonomous drone but you lacked the money? The student in this video developed a autonomous drone by hacking a $20 toy helicopter which is completely awesome! Drones has been rising in the public market for several years now and you can find them in various prices. The military has been working on their own drones and they equipped them with various tools like camera's, microphones, trackers, jammers and weapons! 

Each hacker will get this warning from Google

Are you a security expert or are you a malicious hacker? Google does not care! If you are using search queries that are noted as 'hacking' by Google you will get a warning from Google on your screen. The Google machine will tell you that the systems have detected unusual traffic from your computer network, and that they have banned it from making any further queries. 

Chinese CNCERT report raises the alarm on attacks originated overseas

For Google it is time to encrypt all GMail connections

Google has announced to have adopted encrypt mechanisms for all Gma​il connections to reply to the increasing demand of privacy of Internet users.

Working: How to hack WPA2 Wireless security

Are you searching for a tool or method to hack WPA2 secured WiFi connections? Well, this team of investigators have found a way on how to breach a WPA2 security quite easily. The researchers say that this wireless security system can be breached by a malicious attack on a network. they can simply browse to the router and change the WPA2 password, but they also claim the following