Zero-day vulnerability in Internet Explorer already exploited by hackers
Wireshark goes with GTK + to Qt
The "Shield". Google will protect the weak from DDoS-attacks
Trojan captures Android.Spy.40.origin Android-smartphones
How to turn Android-powered device into a tool for pentesting?
10 Apps to Secure Your iPhone
Documentation on the exploits nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
Secure data transmission. How to do without "clouds"?
Hacker Denis Chalovskaya released
Torrent trackers to be blocked by IP-address
Enter your email address to subscribe to "Bytes" Mag & receive THE latest updates on Tech!