The disclosure this week of a cache of files supposedly stolen from the National Security Agency has put a spotlight on secret cyber weapons the NSA has been holding -- and whether they should be disclosed.
A suspect in the recent data breach at Sage, a U.K. provider of business software, has been arrested. On Wednesday, police in London detained a company employee.
A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen.
Not even the National Security Agency is immune to carelessness, according to noted leaker Edward Snowden. The agency’s operatives can get lazy, and sometimes they leave behind files inside the servers they’ve hacked.
A ransomware strain has been making a pretty penny by opening its doors to unskilled hackers and then sharing the profits.
An anonymous group claims to have stolen hacking tools that might belong to the NSA and is auctioning them off to the highest bidder.
The hacker who claims to have breached the Democratic National Committee’s computers is now taking credit for stealing confidential files from a related campaign group.
Researchers have found a way to steal a PC’s data by using the mechanical noise coming from the hard disk drives inside.
Millions of Volkswagens built over the past 20 years can be broken into with a hack that exploits the cars’ remote control key systems
As the U.S. presidential election nears, Donald Trump is emerging as the clear winner -- when it comes to his name appearing in spam.
A security firm is offering up to US$500,000 for information on zero-day vulnerabilities in iOS, surpassing Apple's bug bounty just days after it was announced.
For the first time, a fully automated supercomputer is trying to compete with humans in an annual hacking contest – and the machine seems to be holding its own.
Don’t believe everything you see. It turns out even your computer monitor can be hacked.
Giant refrigerator-sized supercomputers battled each other on Thursday in a virtual contest to show that machines can find software vulnerabilities.
Industrial facilities should be on guard against drones. Even off-the-shelf versions of the unmanned aircraft could be used to disrupt sensitive systems.