Chinese Hacker Accused Of Stealing F-35 Fighter Lauded As Hero In China

According to court documents, Su Bin also known as Stephen Su locally, is a wealthy businessman. According to prosecutors, the hacking took place between October 2008 and March 2014. The Chinese government has denied any connection to Sus case. In the meanwhile, Su is being lauded as patriotic in his home country. If Su was wronged and forced to plead guilty, he should have our sympathy. But it also questioned whether the plea agreement revealed the truth of the matter....

March 30, 2016 · 1 min · 155 words · Michael Watson

This 16-Year-Old Hacker Releases A Silly Game By Hacking Into Steam

Ruby Nealon, who created the game called Watch Paint Dry, is a game about watching paint dry. It made its way onto Steam without going through Greenlight or acquiring an elusive Valve stamp-of-approval. Thanks to Nealon, the vulnerability he exploited has now been fixed. He helped them fix this backdoor into Steam, which was his agenda from the start. ?I was responsible for Watch paint dry. Getting caught was part of my plan....

March 30, 2016 · 1 min · 132 words · Calvin Gallagher

FBI seems to have found a way to hack San Bernardino shooter’s iPhone without Apple’s help

Meanwhile maverick entrepreneur, John McAfee sought to take credit for the latest FBI filing. He told told CNBC that he was instrumental in the FBIs change of heart. McAfee had previouslypublicly offered to hack the phone for the FBI. source: www.techworm.net

March 22, 2016 · 1 min · 41 words · Luke Allen

15 Best Hacking Movies Of All Time: See Hackers At Their Best

It is not easier to depict a hack going on in a movie. Very few movies have shown the actual depiction of hacking correctly. We have tried our level best to bring out the list of these best movies showing hackers. Lets take a look at the 15best hacking movies listof all time. Table Of Contents Top 15 Hacking Movies Of All Time 1. This is one of the best hacker movies of all time....

March 13, 2016 · 3 min · 469 words · Christopher Knight

Apple’s Mac computer’s hit with ransomware, here is how to get rid of it

KeRanger spreads through a infected version of the Transmission BitTorrent client for Mac. Ransomware, one of the fastest-growing types of cyber threats, encrypts data on infected machines. To verify, double-poke the process and choose the Open Files and Ports tab in the window that appears. Users should select Quit -> Force Quit to stop the process. The above process only works if you catch KeRanger before it executes. Once it has executed itself, the ransomware will encrypt all your files with a strong encryption algorithm....

March 8, 2016 · 1 min · 159 words · Robert Bryant

Google admits partial blame for its self driving car crashing into a bus

The company admitted that it was partially responsible for the minor collision, which happened earlier in February. According to the report, the crash happened in Mountain View, near Googles headquarters. source: www.techworm.net

March 1, 2016 · 1 min · 32 words · Micheal Gomez

ISIS’s Cyber Caliphate hacks the wrong Google

They instead defaced the website https://addgoogleonline.com, registered in the name of Gandani K. from India. Hacked By: CCA, the defaced website said. Cyber Caliphate published a list of the websites it had managed to hack through Monday. Almost all of the websites listed in the Telegram message belonged to random collection of small businesses websites. source: www.techworm.net

March 1, 2016 · 1 min · 57 words · Andrew Meyer

E-Cigarette battery explodes in mans pocket leaving him severely injured

Josh Hamilton, the victim, is recovering from severe burns on his right thigh. He was giving me money, he put his hand in his pocket, so suddenly there was fire. I was like, What was that? You have a bomb in your pocket? I was like that! You carry your bomb in your pocket? Then another customer took him to a hospital, he said. Third degree burns all up and down my leg....

February 28, 2016 · 1 min · 198 words · Veronica Weaver

You can send self destruct audio and video message on iPhone without any App

All you have to do is head to your configs app. From there, hit the green Messages icon and scroll down to the Audio Messages section. Remember its not as slick and secure as Snapchat but its still useful for all your self destruct needs. source: www.techworm.net

February 27, 2016 · 1 min · 47 words · Monica Drake

NSA Data Center effect : This state experiences 300,000,000 hacking attacks a day

All this due to a NSA data center situated in the state. We had peaks in the past year or so that were over 300,000,000 a day. According to the state officials, most of the attacks are done by botnets. Hacking programs set in motion by them sweep the states computer systems, searching for signs of weakness. Although other states were seeing increases, most were not seeing anything like we were, Squires said....

February 21, 2016 · 1 min · 114 words · James Barrett

Kanye West of TLOP fame is reportedly suing The Pirate Bay for piracy

TLOP was made available to users through a online streaming siteTidalas a download. TPB is however not happy with the shenanigans of West. Kanye West is a blithering twat who has an incredible sense of self-importance. TPB staff member Spud17 informs TorrentFreak. Our legal department will be waiting, he adds. Needless to say, the TPB team has no intention of removing the album from the site. They have a clear policy not to remove any copyright-infringing material....

February 20, 2016 · 1 min · 107 words · Daniel Jones

Using this hack you can download Windows 7/8.1 ISOs for free

How to download Windows 7/8.1 ISOs To use the code is very simple. Once done, you’re free to download the official ISOs straight from Microsofts servers. Remember this hack seems to be working as of now. source: www.techworm.net

February 17, 2016 · 1 min · 38 words · Alexander Hudson

How To Stop Your Samsung Smart TV From Listening To Conversations

Its privacy policy also reveals the fact that the smart TV is capable of spying on the owners. However, there are many collararies attached to this spying TV business which you should know. Not all Samsung smart TVs have snooping capabilities. How do I stop my Samsung TV from listening? To do this,head to the parameters menuandselect Smart Features. Then scroll down toVoice Recognitionandswitch it off. In Samsung TV models (2017-2019):...

February 16, 2016 · 1 min · 99 words · Briana King