Zero-day vulnerability in Internet Explorer already exploited by hackers
Wireshark goes with GTK + to Qt
The "Shield". Google will protect the weak from DDoS-attacks
Trojan captures Android.Spy.40.origin Android-smartphones
How to turn Android-powered device into a tool for pentesting?
10 Apps to Secure Your iPhone
Documentation on the exploits nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
Secure data transmission. How to do without "clouds"?
Hacker Denis Chalovskaya released
Torrent trackers to be blocked by IP-address
Antivirus, McAfee is investigating problems with its SaaS-service Endpoint Protection, which as a result of the availability of software bug allows the use of protected computers as open proxies to send spam. The report McAfee says that the above analysis of the problem is now working as an analytical...
Enter your email address to subscribe to "Bytes" Mag & receive THE latest updates on Tech!