This article discusses the cyber attack allegations by Ukrainian authorities against Russia using the Petya malware. It explores the evidence and responses from
Security experts warn of an increase in DDoS tools available online. Hackers are targeting young users through social media to participate in network attacks wi
Following Edward Snowden's revelations, a new NSA contractor has been charged with leaking top-secret documents to an international news site. This incident rai
Explore how WeChat's massive user base is pushing traditional Chinese mobile operators to transform and adapt in the digital age. Discover key trends and challe
A MongoDB database was left unsecured, exposing sensitive data of 31 million Android users from the ai.type app. Learn about the breach, including names, phone
Oracle introduces its latest automated database, Oracle 18c, which can self-repair security vulnerabilities without downtime. Featuring advanced machine learnin
Learn how Uber's engineering team used React Native to develop the Restaurant Dashboard for UberEATS, enabling seamless food delivery experiences. Discover key
US President Trump will meet with executives from the wireless communication and drone industries to discuss creating an environment for technological breakthro
Explore the challenges of deep mining gene big data and its impact on precision medicine. Learn about the latest developments in genomics research and applicati