GuidePedia
Latest News

0
Now Chat Anonymously with Tor Instant Messenger
Now Chat Anonymously with Tor Instant Messenger

SP's: The Tor Project has announced the release of the beta version of its Tor Messenger that allows you to chat anonymously over the Tor network. Built over Mozilla’s Instantbird platform, the Tor Messenger can be used by Windows, Mac and Linux use… Read more »

Read more »
31Oct2015

0
How Innocent Copy-Paste Leaks Your Previous Embarrassing Google Searches
How Innocent Copy-Paste Leaks Your Previous Embarrassing Google Searches

SP's: Our innocent habit of copy-paste is reflected when we send the URLs of search pages as some reference to our friends. But, it comes with the risks of exposing your previous searches, if done carelessly. Read the post to know the risk involved … Read more »

Read more »
29Oct2015

0
Germany Suspects, Will Investigate Google and Facebook Over Data Transfers
Germany Suspects, Will Investigate Google and Facebook Over Data Transfers

SP's: he European Union has many a times been apprehensive of the US-based tech companies, especially on the matters of privacy and data security. Now, Germany has raised concerns over the illegal data transfers from the EU to the US by the global c… Read more »

Read more »
28Oct2015

0
Which Antivirus Software Protect Themselves From Hacking Attacks?
Which Antivirus Software Protect Themselves From Hacking Attacks?

SP's: Even though the number of users aware about the basic security practices is increasing day-by-day, most of us are unaware of the fact that the antivirus software can also be hacked. Along the similar lines, AV-TEST has conducted a test and lis… Read more »

Read more »
28Oct2015

0
FBI Advises Ransomware Victims To Pay The Ransom for Retrieving Data
FBI Advises Ransomware Victims To Pay The Ransom for Retrieving Data

SP's: FBI has advised ransomware victims to pay the ransom and retrieve their data as there is not much the top law enforcement agency of the USA can do in this matter. It is pretty difficult to decrypt the ransomware so users are at the hacker’s me… Read more »

Read more »
28Oct2015

0
US Freaks Out, Worries Russia Would Cut Undersea Internet cables
US Freaks Out, Worries Russia Would Cut Undersea Internet cables

SP's: Russia got the US intelligence agencies into a frenzy as its naval submarines and spy ships got too close to the global undersea Internet cables. The US officials panicked as speculations that Russia might be trying to sever the fiber-optic ca… Read more »

Read more »
28Oct2015

0
15-year-old Boy Arrested Over the TalkTalk Hacking Attack
15-year-old Boy Arrested Over the TalkTalk Hacking Attack

SP's: A 15-year-old has been arrested in Northern Ireland in connection with the cyber-attack on the TalkTalk’s website. This news of 15-year-old hacker’s arrest has stunned the security experts as it was assumed that a group of ISIS terrorists or R… Read more »

Read more »
28Oct2015

0
Here’s How This Web Page Sniffs Anyone’s Browser History Using Sniffly Attack
Here’s How This Web Page Sniffs Anyone’s Browser History Using Sniffly Attack

SP's: By abusing the HTTP policies of your web browser, a security engineer has devised a new technique to sniff the browsing history. Using Sniffly and HSTS timing attack, an arbitrary website can violate the privacy of its users. Read ahead to mor… Read more »

Read more »
28Oct2015

0
Secure Your Password With Enigmaze Password Generating Book
Secure Your Password With Enigmaze Password Generating Book

SP's: Enigmaze Secure Password Generating Grid System Manager has come up with the most efficient and innovative ways of generating new and strong passwords, and protecting the existing ones. It is aided with features like hardcover password journal… Read more »

Read more »
28Oct2015

0
Microsoft: Windows 10 Collects Data to Improve ‘Your’ Experience
Microsoft: Windows 10 Collects Data to Improve ‘Your’ Experience

SP's:  In another attempt to clear the confusion clouds, Microsoft said that users shouldn’t worry about the Windows 10 data collection practices. In a recent interview, talking about the data collection, Microsoft’s VP Joe Belfiore said that the co… Read more »

Read more »
27Oct2015

0
This Open-source Program Recognize Your Faces in Real Time
This Open-source Program Recognize Your Faces in Real Time

SP's: penFace, the open source face recognition technology developed by the researchers at the Carnegie Mellon University, has been rolled out. The OpenFace holds ground against the much-advanced proprietary face-recognition technologies by private … Read more »

Read more »
27Oct2015

0
Case Against NSA Dismissed Because Nobody Can Prove That It is Spying
Case Against NSA Dismissed Because Nobody Can Prove That It is Spying

SP's: The US District Court has dismissed a lawsuit by Wikimedia against the NSA surveillance. The District Court ruled that the lawsuit merely rested on “the subjective fear of surveillance” and it was “unpersuasive,” “incomplete,” and “riddled wit… Read more »

Read more »
26Oct2015

0
Google Hacker James Forshaw Tells Why Windows 10 Is Good As Well As Bad
Google Hacker James Forshaw Tells Why Windows 10 Is Good As Well As Bad

SP's: Accomplished Google hacker James Forshaw thinks that Microsoft has delivered a “good” operating system, but it has failed to ensure the overall user security. He praised it for some improvements and called it the “Two step forward, One step ba… Read more »

Read more »
26Oct2015

0
How a Codeless Hack Won $5000 at Facebook Hackathon Without a Single Line of Code
How a Codeless Hack Won $5000 at Facebook Hackathon Without a Single Line of Code

SP's: Driven by the open source philosophy, two Facebook interns won $5,000 at a Facebook Hackathon. They performed a codeless hack and made a tool to debug the failed Battery Backup Units (BBU). Read more to know their story. This is an article tel… Read more »

Read more »
25Oct2015

0
This 11-year-old Girl is Selling Super Secure Passwords for $2 Each
This 11-year-old Girl is Selling Super Secure Passwords for $2 Each

SP's: Mira Modi, an 11-year-old girl, has started a business of selling cryptographically secure passwords for $2 each. She generated Diceware passwords, writes them by hands and sends by postal mail. The unprecedented speed, at which data breaches … Read more »

Read more »
25Oct2015

0
Self-driving Cars Must be Programmed to Kill, Study Says
Self-driving Cars Must be Programmed to Kill, Study Says

SP's: As we advance more and more in artificial intelligence and related technologies, we must solve some complex ethical problems. A similar dilemma is faced in the case of self-driving cars and how they should act in case of unavoidable accidents.… Read more »

Read more »
25Oct2015

0
Facebook Exposing Trillions of Posts to Public Search, Change Your Settings Right Now
Facebook Exposing Trillions of Posts to Public Search, Change Your Settings Right Now

SP's: To make its search more functional, Facebook has indexed about 2 trillion public posts. Now, you can search the pictures, news and posts of your interest by entering some phrases in the search box. However, if you want to opt out, you need to … Read more »

Read more »
25Oct2015

0
Are You Under the Attack of CCTV Botnet?
Are You Under the Attack of CCTV Botnet?

SP's: Internet of Things are constantly being targeted by attackers to get the better off of the companies or individuals. CCTV surveillance cameras are generally preferred for the purpose. Make sure you do not come under the attack of CCTV botnet. … Read more »

Read more »
23Oct2015

0
This Hacker is Destroying Racist and Homophobic Websites One by One
This Hacker is Destroying Racist and Homophobic Websites One by One

SP's: - A hacker that operates a Twitter handle named Amped Attacks, is taking down the websites spreading homophobia and racism one by one. Via the Twitter account, the hacker tweets the next targets and tells the world about its activities. There … Read more »

Read more »
23Oct2015
 
 
Top