
#1
World War Hacker by
Set in an alternate Early 21st Century, somewhere around the late 90s and early 2000s, Machines are created to help humans and to provide care and aid. But then, on Marc...

#2
Harassment and Open Vandalismby がんばれ
Here are the proof that some druggy lunatics who desperately seek attention and want it at any cost are manipulating my friends and Readers alike.
They know no bounds.
T...

#3
What is Cybercrime and Protect You...by Alice White
Cybercrime is any illegal activity that involves a computer, networked device or a network. Most cybercrimes are carried out in order to generate profit for the cybercr...

#4
Tips to Protect Your Android Devic...by Alice White
Mobile Ransomware attack is a type of malware that blocks your android device and demands ransom to restore access. The first thing to protect from ransomware attack, yo...

#5
Catch Me If You Canby Kyra Z
Over a hundred years into the future, the anonymous hacker Glitch terrorizes American Empire servers and leaks confidential government secrets onto public websites. Of c...

#6
BEHIND THE FILES: "1"by TheSecretCompanyOrg
"Behind the Files" follows cybersecurity expert Alex Mercer and Detective Sarah Collins as they uncover disturbing files on a company's server linked to a seri...

#7
The Blue Light Projectby Arinthos
The Blue Light project was launched by a secret organisation to further their dominance on the world. However things took a quick turn when the lead of project, Ajay had...
Completed

#8
Monopoly of Thoughtby Quor
Retired NSA agent Stone and his paraplegic wife Dakota wake up one morning to discover someone's deposited over $100,000 into their bank account. Investigating the cause...

#11
CYBERby Etamateni Æ Monetes
William Haka, usually considered as the most wisest child ever born. Due to his extremely talented gifts, many sought to own that gift. Even though he is just a boy, he...