For those of you interested in cryptocurrencies. This is a great diy tutorial
We'll post the rig I built out of wood soon.

The meteoric rise of ethereum has fueled something of a gold rush for people looking to get in on the action by mining ether themselves. This requires buildi...

My Acer Chromebook 14 just got a chrome update and now I have access to all the apps in the google play store to run on my Chromebook. This is huge for those that don't know. I can now easily install and run Kodi, adobe photoshop, android mobile office, JuiceSSH, and soo many other really useful apps that are in the google play store. 1
million+ apps available but not all Chromebooks can run that.…

Android — and 1,000,000+ apps — on your Chromebook is awesome. See where your Chromebook is on the list.
We are excited to announce that Amazon EC2 usage of Linux based instances that are launched in On-Demand, Reserved and Spot form will be billed on one second increments, with a minimum of 60 seconds.

In 2017 google will purchase 100 percent renewable energy to account for all the energy used at all of its data center and corporate offices

Joe Kava, VP Google’s global data centers, talks about what makes our data center performance best in class. Learn about our expansion, our end-to-end highly...
HTTP over a secure socket layer (SSL) is what we call simply as HTTPS, helps us to safely share our sensitive data over the internet. But, how actually it works? What is happening behind the scenes? Here is my attempt to explain it (without out the nitty gritty details) visually
South Korean web hosting provider pays $1 million to Erebus Linux ransomware hackers to get files back hosted on its hosting servers.
A data analytics contractor employed by the Republican National Convention left databases of information on nearly 200 million potential voters exposed to the internet without security, such that anyone who knew where to look could download it without entering a password
Over the decades, computer viruses in the form of malware and coded exploits have brought down millions of personal computers worldwide, causing loss of productivity and control over precious files and documents. While anti-malware measures have been put up in the form of software, these are not goo...

Andriod systems are now vulnerable to this.…/

Notorious hackers from China are targeting Android smartphones. They've copied the look of WannaCry and developed WannaLocker ransomware.|By Adarsh Verma

Cell phone 2factor is not real 2 factor this person had his Verizon cell number changed with just billing info no pin no social.

Pretty scary to have something that regulates blood flow inside people vulnerable to anyone who has malicious intent.

Some of the weaknesses are simple software bugs, and others are vulnerabilities that could be life-threatening under certain conditions. | By Keith Collins

Everyone is so scared about their computers getting hacked or compromised but most never think about the security of their phones. If your thinking phones password or thumbprint your only stopping physical access, but why do all that when I can penetrate your device from the comfort anywhere in the world via the "internet"

Next time you go to install that free software question why this app needs so much access to your device.…/obscure-app-flaw-creates-backdoor…/…

Researchers at the University of Michigan expose how an obscure feature of thousands of apps can give hackers remote access into your phone's most sensitive guts.
Verizon told customers who use "extraordinary amounts of data" that they will be cut off if they don't pick a new plan by August 31.