Geek To Tech

When Geek Enters The Tech World

How Hackers Can Empty Your Bitcoin Wallet Using Your Phone Number And Email
he security of SMS-based two-factor authentication has been long-debated. Despite flaws in Signalling System No. 7 (SS7), which is an internationally used telecom protocol to route texts and calls, it continues to be used at a large scale in banking and other services. The security researchers Positive Technologies have shown how... Read more
Edward Snowden Leak — NSA Spied On BitTorrent, KaZaA, eDonkey And Other File Sharing Networks
f you’re able to wipe the dust off your memories, you might remember Edward Snowden–the guy who defamed the National Security Agency by revealing their surveillance secrets in 2013. Now, a part of the documents leaked by Edwards Snowden, released by The Intercept, exposes another unsurprising thing about the spying... Read more
The Loopix Anonymity System Can Be A Good Tor Alternative, Comparison Shows
Loopix is another name that adds to the list of anonymity networks like Tor. It is developed by the researchers at the University College London (UCL) and published in a research paper titled “The Loopix Anonymity System.” As Bleeping Computer points out, Loopix works similarly as Tor. It’s a type of mix network... Read more
Top 10 Password Managers (Linux, Windows, iOS, Android and Mac) for [2017]!!!
We all find trouble with using passwords. Passwords surely help us a lot in our lives but their should be an easy way to manage them. If you’re finding a good password manager, then this list is definitely for you. Read on about all the features of the top... Read more
Top 20 Operating System For Ethical Hackers And Penetration Testers
Hacking is an essential skill in today’s world. Computer networks are becoming more and more used by people. Security, therefore, becomes the number one priority of an organization or an individual while they’re on the web. Any information leak can lead to a disaster if misused by a black... Read more