Android Spyware Targeting Middle East

June 26th, 2019 Amidst the news that Chinese hackers have gained a foothold on the global telecommunications network, comes news that is familiar…

Hackers Have Been Stealing Call Records for Years

June 26th, 2019 Malicious hackers have been infiltrating our telecommunication for years, and, thanks to a group of researchers, we've just now begun…

NASA’s Jet Propulsion Laboratory Compromised Due to Poor Security Practices

June 24th, 2019 NASA's Jet Propulsion Laboratory was hacked as recently as April 2018, according to a report from the U.S. Office of…

SSH Adds Protection for Private Keys in DRAM

June 24th, 2019 To protect users from having private keys that they've stored in RAM stolen by attackers, SSH now provides protection from…

Atlanta Tapped to Host Global Smart City Expo

June 20th, 2019 Smart technology has infiltrated our lives. Our watches are smart, our thermometers are smart, and now our cities are becoming…

Some Mozilla Users Potentially Vulnerable to RCE and UXSS Attacks

June 19th, 2019 Mozilla has released version 67.0.3 of Firefox and version 60.7.1 of Firefox ESR to patch a critical vulnerability that, if…

BASIC is the First Programming Language to Receive a Historical Marker

June 18th, 2019 The BASIC programming language is often considered as the language of the 80's. That's because the idea of the personalized…

8 Best Tech Presentation Tools

June 17th, 2019 Giving a tech talk about, for example, emerging trends requires the proper tools to get the job done. There's the…

JavaScript is the Most Used Programming Language, According to JetBrain Poll

June 14th, 2019 To kick off 2019, Jet Brains polled nearly 7,000 developers to determine "the state of the developer ecosystem."  69% of…

9 Linux Tools That Make Programming on Terminals Easier

June 13th, 2019   The Unix philosophy embodies a system of modularity, which allows for a seemingly limitless opportunity for extending various Unix…