Microsoft’s Edge Browser hacked in just 18 secs at PwnFest

This feat was achieved at the PwnFest being held in Seoul. For this effort, the Qihoo Team and Lokihardt won $140,000 from the organizers. The team discovered vulnerabilities in the Windows 10 internet tool enabled system-level remote code execution. At the top layer, consumers will see the applications they normally use. Under that are equipment drivers with low privileges followed by equipment drivers with high privileges further underneath. The Qihoo 360 team was working on developing the attack for the past 6 months....

November 11, 2016 · 1 min · 85 words · James Smith

What computer/laptop do big tech companies give to their engineers & programmers

One of the big questions facing a prospective computer or laptop buyer is which brand PC/laptop he/she should buy. So what should such a buyer do in such cases? give to their engineers and programmers. And what is good for them should be good for you! What laptop/computer does google give employees? We will start off with the big daddy of them all, Google. Developers at Google typically choose a desktop and a laptop, and they can choose what they want....

November 8, 2016 · 2 min · 336 words · Michele Hansen

Hacker Discovered A Vulnerability In Gmail That Allows Anyone To Hack Any Email Account

The main objective of these programs is to make Googles applications and systems more secure and protected. source: www.techworm.net

November 5, 2016 · 1 min · 19 words · Theresa Young

Microsoft puts an end to OEM sales of Windows 7 and Windows 8

Examples of OEMS are Dell and ToshibaPC manufacturers who often pre-install Windows software, reported Forbes on Thursday. Microsoft announced earlier this year that it would be rolling out two major updates for Windows 10 next year. source: www.techworm.net

November 4, 2016 · 1 min · 38 words · Michael Davis

Google shortened link doing rounds on Twitter is causing havoc in United States

The Firefox net surf tool pops up LOLOLOLOL message before hanging up. The link also causes multiple instances of File Picker UI Host to run in Windows 10. This hack has gone viral and is being used on Twitter. The name of the hacker has been kept anonymous while the police are investigating the matter further. It kind of just looked like a YouTube video, so I clicked on it, Jara said....

October 27, 2016 · 1 min · 144 words · Mary James

Top Python Tips and Tricks Every Developer Should Know

Developed in the 80s, Python is open source and free to use, even for commercial applications. Further, Python is also dynamic and supports object-oriented, procedural, and functional programming styles, among others. Thanks to its flexibility, Python is one of the most widely used high-level programming languages today. If you are learning Python, here are some awesome Python tricks you should know about. For even more on list comprehensions, check outTrey Hunners tutorial....

October 22, 2016 · 1 min · 183 words · Ryan Christian

World’s first hack-proof Wi-Fi router with open source firmware is here

WiFi Routers are the gateway for every home and business Internet data pipe. Though they are the mainstay behind your Internet connection so little has been done or thought about their security. In most of the cases, the only security feature enabled on your WiFi router is its default password. Now it seems someone has woken up to the dangers of vulnerable routers. NIC.cz has come up with Turris Omnia router which is said to be the worlds first hack-proof WiFi router....

October 22, 2016 · 1 min · 143 words · Michael Adams

Xiaomi made a smartphone with bendable touchscreen

However, there are no details about the smartphone yet or any release date either. Earlier this year, Bloomberg had reported that Samsung may release two bendable OLED screen smartphones next year. Source:The Verge Read More source: www.techworm.net

October 18, 2016 · 1 min · 37 words · Linda Solomon

How much RAM does your PC actually need?

Ditto for a hardcore gamer who tries to save money by buying 2GB RAM for his gaming PC. Here we give a definitive guide to how much your PC or laptop actually needs. Note # How much RAM your PC supports will depend on your motherboard. If you are one with above needs, 1GB RAM may suffice your requirements. However, with a 64-bit operating system then youll have full access to the whole 4GB....

October 17, 2016 · 1 min · 187 words · Ryan Ferguson

Learn The Entire JavaScript Language in a Single Image

Yusheng has already created a single image to learn popular hackers language, Python which we have featuredhere. We will bring the same when he releases it. source: www.techworm.net

October 12, 2016 · 1 min · 28 words · Linda Johnson

Proof of UFO that was 120 times faster than a Plane released

New Zealand news channels were abuzz with the news of UFO sighting. The video has it part of naysayers. source: www.techworm.net

October 12, 2016 · 1 min · 21 words · Brooke Dixon

This Developer Hacked Kinect + HoloLens to Control A Holograms Entire Virtual Body

And Kyle isnt done yet. He hopes to put his experimentation to further use. source: www.techworm.net

October 12, 2016 · 1 min · 16 words · Jennifer Short

Top 3 Wi-Fi pentesting tools in Kali Linux

The top three Wi-Fi pen testing tools in Kali Linux Every hacker and security researcher loves Kali Linux. The developers of Kali Linux ethical hacking distro have released the second Kali Rolling ISO release i.e.Kali 2016.2. Just like the previous one, Kali promises to deliver lots of new updates and changes in this release. For example, they have added HTTPS support in busybox that allows secure installation over SSL. Kali Linux provides you the flexibility to install your favorite desktop environment and personalizing your experience....

October 10, 2016 · 1 min · 183 words · James Thompson