Hacking Vulnerability

Whom is at Risk Dare I say the whole world and or anyone that uses a device known to man to deliver and understand computed algorithms . For years major scientists have worked two keep us secure by developing new security algorithms and then hackers of every colored hat community have worked hard in order […]
Continue reading…

 

Kill Switch California

  Kill Switch 2 As the bill awaits the final signature in California of the governor . It has Ben rumored that the phone companies have already had these capabilities for stolen phones but denied using them because it maid them more money well maybe . Windows 8 and 8.1 have made similar preparation and […]
Continue reading…