IBM

IBM Announced that they Acquired Red Hat for $34 Billion

IBM announced that they have closes its acquisition of Red Hat for $34 billion. The acquisition combines the power and flexibility of...
Certificate Transparency

In-depth Analysis of Certificate Transparency – Detect Fake SSL Certificates

Certificate Transparency aims at increasing safety with TLS certificates. Most importantly CT was put in the place to defend mis-issuance. Certificate Transparency aims to remedy...

Hacker disclosed GitHub secret key hunter – TruffleHog

  A tool for finding secret keys with varying cryptographic strength in github repositories is published by Dylan Ayrey. The tool, named as TruffleHog, can search for and find keys...
3-year-old

3-year-old boy Locked his Dad’s iPad until 2067 by Entering the wrong Password

A 3-year-old boy locked out his dad’s iPad for more than 48 years by entering the wrong password repeatedly.

Network Adapter Priorities | Windows

Network Adapter : Network adapter is nothing but an component associated with the Computer's/Laptop Internal's hardware which is used to communicate with other computers/appliances over the...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security