Home Blog Page 2
Kena Betancur/Getty Images Until now, New York City's police department hadn't disclosed any information about whether or not it used so-called Stingrays to monitor cell phone activity. In response to an NYCLU (NYCLU) request, the NYPD admitted that...
Getty Creative Cyber-security firms Kaspersky and Alienvault Labs announced at the Kaspersky Security Analyst Summit that they had uncovered new evidence linking the massive Sony Pictures hack of 2014 with an ongoing malware attack directed at South...
Thomas Trutschel/Photothek via Getty Images UK authorities believe they've caught a teenage hacker who was part of the recent wave of attacks on US government officials. A 15-year-old boy who goes by the name "Cracka" was arrested...
Andrew Harrer/Bloomberg via Getty Images Tax season is a busy time for the Internal Revenue Service, and identity thieves are only making it worse. The IRS confirmed that hackers used stolen social security numbers automated malware to...
Michael Stewart/WireImage The US government has yet another security breach on its hands. Late yesterday, a Twitter account posted a Department of Homeland Security staff directory containing names, titles, email addresses, phone numbers and more for over...
The Turing Phone promises to be the sturdiest, most secure smartphone around, and now it boasts one more unique feature: Jolla's Sailfish operating system. The Turing Phone will not use Android as promised, Turing Robotic Industries revealed in an...
What do you do when researchers create a worm that infects your company's firmware? If you're Apple, you buy the researchers. Last August, news broke of a exploit named "Thunderstrike 2." Delivered by a simple link, the worm could...
When Perception Point and Red Hat, two reputed security research firms, pointed out a serious issue with Android's security, which could make their devices vulnerable to the attacks of third party applications, Google wasted no time in firing back...
Security firm Check Point Software has discovered an eBay vulnerability that gives attackers a way to use the website to phish unsuspecting users or to infect their devices. So long as attackers use a programming technique known as JSFUCK,...
It appears no anti-virus or security software is safe from Google Project Zero researcher Tavis Ormandy. After recently exposing holes in products from Trend Micro and AVG, the bug hunter has recently gone public with three issues found in...
Keybase, which provided people with a way to encrypt the messages they send, has branched out into file sharing, and it works quite differently from services like Dropbox. You can create two types of folders with the Keybase filesystem:...
JOHN STILLWELL/AFP/Getty Images A United Nations panel has sided with Julian Assange and classified his time in London's Ecuadorian Embassy as arbitrary detainment. In light of this, the group believes his "detention should be brought to an...
If you're an iPhone owner who hasn't had a run-in with the dreaded Error 53, consider yourself lucky. The error — which usually forces iPhones with replacement screens or home buttons into a boot loop after attempting a software...
La bahía pirata está más activa que nunca, y es que han incorporado una nueva función que permitirá reproducir archivos de vídeo directamente sin necesidad de descargarlos previamente. Esto es posible gracias a la incorporación del plugin de Torrents...
"Crackas With Attitude," the hacking group that reportedly broke into CIA chief John Brennan's personal email last October (and whose contents have since been released by Wikileaks), have once again made headlines by infiltrating a number of personal accounts...
When they're not working on their own projects, Google engineers often focus on highlighting potential issues with software delivered by others. We've already seen bug hunter Tavis Ormandy expose a vulnerability in AVG's Chrome security add-on, but he's now...
The Dark Web has a nasty reputation (and deservedly so) but perhaps investigative news publication ProPublica being the first major media organization on the anonymized version of the internet can change that a bit. The reasoning? "We don't want...
The Federal Bureau of Investigation infiltrated and shut down what it called "the largest remaining known child pornography hidden service in the world" this summer, using a hacking method to track IP addresses on the Dark Web, Vice Motherboard...
The US is determined to knock terrorists offline whenever it can, and it's about to go to great lengths to make sure that happens. Business Insider, the Guardian and the Wall Street Journal understand that some of the country's...
Google Chrome already shields you from sketchy websites on the desktop, and now it's doing the same on your smartphone. Grab the latest version of Chrome for Android and you'll get the same Safe Browsing security measures that you've...