To spy on a human rights activist, government hired hackers may have gone as far to use three previously unknown vulnerabilities in Apple’s iOS.
A hack claims to have breached 25 million user accounts from forums belonging to Mail.Ru Group. But all of the stolen passwords are invalid, according to the Russian Internet company.
Twitter users aren’t the only ones checking the microblogging service for important updates. Android malware is starting to do so, too.
A vulnerability in a widely-used internet forum software is becoming a go-to method for hackers to steal data.
It’s never a good sign when a website markets itself with a phony security award. But that’s what Ashley Madison did prior to last year’s massive data breach.
A recent data breach at Epic Games may have been avoided if the company had simply installed a security patch.
Anonymous hackers probably gave away hundreds of thousands of dollars in potential sales when they leaked valuable cyberweapons allegedly stolen from the National Security Agency.
Republicans in Congress have subpoenaed three technology companies that declined to hand over documents about former U.S. Secretary of State Hillary Clinton’s private email server.
Smart sockets that let you control an electrical plug over the Internet may sound cutting edge, but they can also be rife with security flaws.
The disclosure this week of a cache of files supposedly stolen from the National Security Agency has put a spotlight on secret cyber weapons the NSA has been holding -- and whether they should be disclosed.
A suspect in the recent data breach at Sage, a U.K. provider of business software, has been arrested. On Wednesday, police in London detained a company employee.
A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen.
Not even the National Security Agency is immune to carelessness, according to noted leaker Edward Snowden. The agency’s operatives can get lazy, and sometimes they leave behind files inside the servers they’ve hacked.
A ransomware strain has been making a pretty penny by opening its doors to unskilled hackers and then sharing the profits.
An anonymous group claims to have stolen hacking tools that might belong to the NSA and is auctioning them off to the highest bidder.