Categories
How to

Application Security Tips For Mobile, Web and Desktop Applications

Data breach not only cost to any organization, data breach also damage brand reputation. To prevent threat, Applications (Web, Mobile & desktop) should be secured. According to a report published in the https://www.forbes.com “84% of all cyber-attacks are happening on the application layer.” So Today we will give you nine security tips to protect your web applications […]

Categories
Cybersecurity

Top Mobile Security Threats Of Digital Era

Remember the days when the greatest security risk was present only on your computer? The spyware and virus has been a big threat that silently monitors user actions and steal personal data. You can also have a memory when a virus damaged your computer system. This attack scenario has not changed at all, but since […]

Categories
Awesome How to

DIY: Your own “mobile’ gaming kit

Do you enjoy playing games on your smartphone? Then this DIY tip will have you go crazy – I saw this GIF on the internet, and I just knew I had to share it with you. It is pretty straight forward on how to build this for yourself . Just take a look at the […]

Categories
Anonymous Defacements Hacking

Syrian Electronic Army Hacked Mobile Washingtonpost Website

The Syrian Electronic Army (SEA) have hacked the mobile version of Washingtonpost news website. The mobile washingtonpost website shows an alert “You’ve been hacked by the Syrian Electronic Army!”,”US govt is training the terrorists to kill more Syrians” ,”Saudi Arabia and its allies are killing hundreds of Yemens people everyday!” ,”The media is always lying”.

Categories
Cybersecurity Hacking

PowerSpy – How to spy on mobile users by monitoring the power supply

A group of researchers has proposed a new technique dubbed PowerSpy to track mobile users’ location by analyzing data related to the power supply. A group of researchers at Stanford University and the Israeli defense company Rafael has discovered a way to track mobile devices by analyzing the power supply. The experts have proposed a technique […]