Category Archive: Computing

New 'Bad Rabbit' ransomware attack spreading across Europe
  • 8
    Nov

New ‘Bad Rabbit’ ransomware attack spreading across Europe

Following in the footsteps of WannaCry and Petya, a new strain of ransomware is now making its way across Russia and Europe. A new ransomware attack is now spreading across Europe in an outbreak that carries echoes of the WannaCry...

Read More
6 best IoT simulators for PC
  • 7
    Nov

6 best IoT simulators for PC

IoT simulators allow you to design, create and test IoT apps and devices without actually using real IoT boards. If you’re looking for an IoT simulator but you can’t decide which one to get, read this article to learn what...

Read More
What is the Year 2038 Problem all about? Is it like Y2K?
  • 30
    Oct

What is the Year 2038 Problem all about? Is it like Y2K?

Seventeen years after the concerns raised by the Y2K bug across the globe; the world is now worried about a new problem. This is called the Year 2038 Problem, and there is a lot of confusion around this problem. People...

Read More
How to run blazingly fast WordPress on Microsoft Azure
  • 18
    Sep

How to run blazingly fast WordPress on Microsoft Azure

Microsoft Azure is the next big thing in cloud computing. Azure is basically a cloud computing service provided by Microsoft that can be used to build, deploy and manage applications through a network of Microsoft-owned datacentres. It is basically a...

Read More
What is ambient computing and why does it matter to you?
  • 14
    Aug

What is ambient computing and why does it matter to you?

Ambient computing is a term that we are hearing more often lately. But what is it and why does it matter? To understand ambient computing we must first understand the Internet of Things (IoT). IoT refers to the interconnected array...

Read More
What’s the difference between WannaCry and Petya ransomware?
  • 5
    Jul

What’s the difference between WannaCry and Petya ransomware?

If you’ve been off the grid for some time and somehow managed to skip on all the fuzz about WannaCry and Petya ransomware, we prepared a brief explanation about the subject and enlisted the main differences between Petya (sometimes called...

Read More
Pwn2Own hacking contest ends with two virtual machine escapes
  • 28
    Jun

Pwn2Own hacking contest ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system. Virtual machines are in used in many scenarios...

Read More
Inferring passwords using WiFi signals – Hacking passwords over WiFi
  • 12
    Apr

Inferring passwords using WiFi signals – Hacking passwords over WiFi

It seems that almost everything is breakable when it comes to security on the Internet. We’ve seen even the best security systems having one or more flaws that can be exploited for the hackers’ benefit. No, some professors across three...

Read More
A new hack steals your PC login credentials from locked computers in 30 seconds
  • 28
    Sep

A new hack steals your PC login credentials from locked computers in 30 seconds

With security methods improving by the day, you wouldn’t have expected this but if Rob Fuller, security engineer, is to be believed, there is now a method to snatch your PC login credentials within 30 seconds. Fuller, who goes by...

Read More
Supercomputer superheroes attempt to autonomously find, plug software holes, for cash
  • 25
    Aug

Supercomputer superheroes attempt to autonomously find, plug software holes, for cash

Seven supercomputers competed in a contest to find software vulnerabilities Giant refrigerator-sized supercomputers battled each other on Thursday in a virtual contest to show that machines can find software vulnerabilities. The result: the supercomputers time and time again detected simulated...

Read More