Zero-day vulnerability in Internet Explorer already exploited by hackers
Wireshark goes with GTK + to Qt
The "Shield". Google will protect the weak from DDoS-attacks
Trojan captures Android.Spy.40.origin Android-smartphones
How to turn Android-powered device into a tool for pentesting?
10 Apps to Secure Your iPhone
Documentation on the exploits nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
Secure data transmission. How to do without "clouds"?
Hacker Denis Chalovskaya released
Torrent trackers to be blocked by IP-address
Interesting takeaway: E-commerce doubled from 2004 to 2011, although it still only represents 8.6% of all retail commerce. However, e-commerce accounts for 30% of all consumer electronic sales.
Enter your email address to subscribe to "Bytes" Mag & receive THE latest updates on Tech!