Poachers Hack GPS Trackers, Extract Metadata from Public Photos to Hunt Animals

A report published in the Conservation Biology magazine cites several incidents gathered from all over the…

Remove The Requested Resource is in Use Error (Removal Guide)

If Windows displays an error stating that The Requested Resource is in Use when you try…

Russian hackers reportedly extorting cash from liberal political groups

 A report from Bloomberg paints a grim picture of left-leaning political groups being targeted by apparently…

Proposed Bill Will Allow Victims to Hack Their Attackers to Stop Cyber-Attacks

The US is discussing new legislation that will allow victims of ongoing cyber-attacks to fight back…

Okta acquihires Stormpath, doubles down on identity in apps and APIs

 Okta, the $1.2 billion identity management startup for enterprises that some tip for an IPO this…

SHA1 Collision Attack Can Serve Backdoored Torrents to Track Down Pirates

A theoretical scenario that leverages the SHA1 collision attack disclosed recently by Google can serve backdoored…

Ransomware Hits Pennsylvania Senate Democrats

A ransomware infection shut down the computer network of the Pennsylvania Senate Democratic Caucus on Friday…

Remove the WinArcher PUP (Removal Guide)

The WinArcher Windows service is a potentially unwanted program, or PUP, that sends information and data…