State Rep. Ron Sandack, a top Republican lawmaker in Illinois, announced his resignation when he issued a statement to the political blog Capitol Fax (in a password-protected post) early Sunday evening. According to the Associated Press and the Daily Herald, Sandack resigned due to “cyber security issues,” raising the…
Yes, yes they will. If you absolutely have to get movies and books for free, make sure you’re doing it responsibly.
There’s a big push among ISIS members to enhance technical knowledge, specifically of software that could be used to counteract surveillance. According to a new report released Friday, discussion among jihadist forums proliferates the circulation of manuals and tutorials on how to use VPNs, proxy services, and other…
If you had trouble logging into Pokémon Go on Saturday, you might’ve blamed it on server issues that have been common since the game’s launch. However, a hacking collective is claiming responsibility for this particular slowdown, saying that it brought the servers down with a DDoS attack.
There have been reports of malicious Pokémon Go apps out in the wild since the game was released over a week ago, but more of them are popping out of the brush than Caterpies just out of Pallet Town.
The FBI is facing accusations that malware it deployed while running Operation Playpen, a sting that infiltrated and maintained a dark web child pornography website for two weeks and eventually led to more than 100 arrests, was illegal. But the agency swears that using malware was good because, well, the FBI had good…
People all over have been trying to enjoy the new Pokémon Go app, which released this week to so much fanfare that it’s experiencing massive server overload. The hype was so real that people were passing around APK files so that people outside the countries where it’s available could side-load it on Android, something…
When the Pentagon announced the “Hack the Pentagon” event back in March, many wondered what kinds of vulnerabilities hackers would find when checking government websites for bugs. Now we know.
Another day, another report that your social-media password could now be for sale on the dark web: a hacker claims to be selling 32 million Twitter log-ins. Twitter, on the other hand, says it wasn’t even hacked and that the information probably comes from other leaks and people using the same password for everything.
A database containing the personal information of millions Mexican voters was discovered online by a security researcher earlier this month on an unprotected server. The discovery represents a major breach in private information for upwards of 87 million Mexican voters.
Knowing a cyberattack’s going to occur before it actually happens is very useful—but it’s tricky to achieve in practice. Now MIT’s built an artificial intelligence system that can predict attacks 85 percent of the time.
At the end of March, hackers broke into the database for the Philippine Commission on Elections in what InfoSecurity Magazine is calling “what could rank as the worst ever government data breach anywhere.”
As our inevitable descent into digital anarchy looms large, there is some comfort to be taken in the fact that powerful, well-funded entities like the Department of Defense are there to provide protection and security. Psych!
GOP presidential candidate and sentient sac of millions of spiders Donald Trump—literally more spiders than you’ve ever seen—does not have a coherent stance on cybersecurity. In his business ventures, though, his cybersecurity record sucks. Trump has failed to encourage policies to prevent large-scale data breaches at…
If I created a hierarchy of cyberattack nightmares, I’d slot attacks on hospitals right up there with having my Google search history downloaded and posted publicly. Maybe dying would be less explicitly humiliating, but getting murdered Homeland-style via hacked medical device is a specifically modern anxiety shudder.
IBM and the US government teamed up to develop a new supercomputer for use on national security missions. It makes decisions like a human brain, and uses less power than a hearing aid.
Matthew Garrett is a Security Developer for CoreOS, and noticed something interesting about the hotel he was staying in. They had installed tablets in the rooms to control the lights, temperature and shades. He also found that they weren’t protected.
The Los Angeles County Health Department is the latest victim of a ransomware attack, just days after a Los Angeles hospital coughed up $17,000 to unlock their files.
Remember when thieves took advantage of crappy security on the IRS’ online tax transcript website and stole the personal information of 100,000 people? We already knew that initial number was a lowball, but we didn’t know how low—an IRS audit recently uncovered that over 700,000 people had their accounts breached, and…
A new system will set aside fingerprints and facial recognition, and start doing brain scans as positive identification. Using brain imaging and a series of words and images, it will scan your mind to figure out if you’re really you.