Tweet
A charger that can install malware on your iOS device,including non-Jailbroken devices.

A charger that can install malware on your iOS device,including non-Jailbroken devices.

  Yes, you read it correct. A modified charger that can install malwares onto your iOS devices like iPhones and iPads, even though its not jailbroken, it does not even needs your interaction. And it takes less than a minutes of charging to get it infected. Recently researchers will show a prototype of this charger in BlackHat(…)

Indian Central Monitoring System, Government can spy on you and your loved-ones without your knowledge.

Indian Central Monitoring System, Government can spy on you and your loved-ones without your knowledge.

India Central Monitoring System the surveillance project is prepared by the Telecom Enforcement, Resource and Monitoring (TREM) and Centre for Development of Telematics (C-DOT) for India Government and being manned by the Intelligence Bureau. According to Anonymous the ICMS can monitor everything you do online, even without a suspicion of crime. This means that the government will have(…)

The Pirate Bay co-founder Gottfrid Svartholm, charged with hacking companies and bank.

The Pirate Bay co-founder Gottfrid Svartholm, charged with hacking companies and bank.

The co-founder of The Pirate Bay Gottfrid Svartholm has been charged with hacking.Together with three others he is suspected of hacking several companies including a bank, from where he allegedly attempted to transfer money. This are the new changes that will most likely mean that Svartholm will remain in prison when his Pirate Bay sentence concludes(…)

Targeted Attacks, now using Android Malware.

In the past we have seen many targeted attacks on platforms line windows and Mac OS X. Now the cyber criminals who are making a targeted attack are using Android Malware. Generally in an email attachment we have seen that there is an infected doc, docx, xls, pdf file. But not there is an apk(…)

HTC One Overview.

HTC One Overview.

Recently I got a chance to get my hands on the yet to be released HTC One in an event hosted by HTC. I did not get a test device to bring home so I am unable to write a full review. But I will share whatever things I could test and whatever info I(…)

HTC One Meet-Up in Kolkata.

HTC One Meet-Up in Kolkata.

Today I was invited to the HTC One Meet-Up by HTC in Kolkata, Hyatt Regency. If you have been already following my live blog, or even you have not followed it, here is the full details post of the event. The event as mentioned before was held at a hotel in Kolkata, Hyatt Regency. The Android powered phone(…)

HTC One Meet-Up Kolkata (India) Live Blog.

HTC One Meet-Up Kolkata (India) Live Blog.

Today there is a event hosted by HTC at Hyatt Regency Kolkata, I am very much thankful to HTC for sending me the invite for HTC One Meet-up. I will be live blogging the event. And post event I will give a details write up about the HTC One phone (that’s if I get a(…)

Samsung Galaxy Note II security flaw.

Samsung Galaxy Note II security flaw.

A security flaw on Samsung Galaxy Note II has been discovered by Terence Eden that allows you to temporarily bypass the lock screen and have a peek at the users home screen, and lets you speed dial, if your finger has enough speed. Check out the video, to know more.  

How Google Search Works.

How Google Search Works.

Ever wondered how Google Search worked? Well now you can have a nice graphically represented answer to it, from Google itself.   Go to http://www.google.com/insidesearch/howsearchworks/thestory/    to see it in action.

FBI raids teenagers house over Xbox secrets.

FBI raids teenagers house over Xbox secrets.

A teenage from Perth who is popular in Twitter by the name SuperDaE was raided by the FBI and WA Police and his possessions were seized. as a part of investigation in international corporate espionage probe. SuperDE posted sensitive information about Microsoft’s yet to be released Xbox. He also posted an online advertisement offering to sell a development kit(…)