The shadowy hacker collective is upset over the tracking and profiling of citizens.
Analysis: Tech security has something in common with the Industrial Revolution. Both transformed four key aspects of society: innovation, transportation, communication and financial markets.
Hackers are stealing customer credentials through malware installed on mobile phones and PCs in phishing attacks.
This brand-new crowdfunding platform is targeted specifically at software developers.
A dark-haired, bearded hacker peers into his computer's screen, perhaps puzzled at what's happening. Minutes later, he cuts his computer's connection, realizing he has been discovered.
Analysis: An apparently innocent inquiry with a company you do business with might warrant scrutiny. Perhaps it's a scam, or perhaps it's fine and the company itself is getting careless.
Social Security numbers and credit and debit card numbers were exposed in the breach discovered Oct. 10.
Disillusioned by WikiLeaks, international hacker group Anonymous has decided to take matter into their own hands and launch TYLER.
Security vendors Sophos and Kaspersky Lab both warn of scam emails using the names of well-established companies to try to lure victims to malware sites. The scheme is obvious, or ought to be—the bad guys figure that if they use a trusted name, victims will trust the link.