Hackers figure out how to seize control of a car from anywhere
A pair of well-known hackers have proven that they can take over a car's vital functions--including brakes and acceleration--from anywhere...
A pair of well-known hackers have proven that they can take over a car's vital functions--including brakes and acceleration--from anywhere...
Worried that you might have been targeted with Hacking Team spyware, but don't know how to find out for sure?...
A company known for visibility for network management launches a cyber security tool with a similar approach. If you're familiar...
Microsoft Windows users have been told to download a security patch IMMEDIATELY following the discovery of a "critical" security flaw...
Toronto hackers threatened to leak details including the credit card information, nude photos and sexual fantasies of as many as...
Ashley Madison, a dating website created for relationship cheating, has had its entire 37-million user database seized by hackers -...
With Microsoft's Wi-Fi Sense, people connect to open Wi-Fi networks. But does simplifying the connection process increase the peril? Some...
On average, an IT executive has only seven minutes to determine whether their organization is under attack. This is according...
University of California (UCLA) Health, which runs four hospitals, and drug retailer CVS Health’s photo service had millions of individuals’...
A British man has been rearrested and charged with hacking into US government agencies, including the US Army, NASA and...
Authorities have shut down what they say was the largest English-speaking malware forum used by cyber criminals around the world:...
I'm sure you have read about the hackers and malware that are accessing people's webcam and spying on them. We'll...
Another day, another round of security fixes. And it's not even the first round of the day, if you count...
Hackers appear to have stolen the entire user database of cloud-based Bitcoin mining outfit Cloudminr.io and are offering to sell...
Internet users should take renewed caution when using both Adobe Flash and Oracle's Java software framework; over the weekend, three previously...
The former contractor for NSA, Edward Snowden, became famous for revealing PRISM, a confidential mass surveillance program run by the U.S....
I created a quick reference guide for John the Ripper. Useful for those starting in order to get familiar with...
Bug allows attackers to issue invalid certificates, but is difficult to exploit and only affects OpenSSL versions released since last...
If you've lost your Android device, and it happens to be protected by Cerberus, locating said device (or protecting the...
HACKED!A German Patriot anti-aircraft missile system stationed on Turkish-Syrian border was reportedly hacked and taken over by an unknown "foreign...
ESET researchers have discovered that exploits, exposed in the recent Hacking Team leak, are now being used by an attack...
Katherine Archuleta, director of the Office of Personnel Management (OPM), handed her resignation to President Obama after the data of...
When members of the the Royal Canadian Mounted Police (RCMP) met with the Italian surveillance company Hacking Team in Ottawa...
Adobe Systems Inc. says its plans to issue a patch on Wednesday to fix a zero-day vulnerability in its Flash...