Microsoft’s amazing HoloLens is the world’s first stand-alone headset that lets users see virtual objects and environments as if they existed in the real world. This device’s entertainment potential is practically unlimited, but as a Hackathon team recently demonstrated, it can also be used to rewire a malfunctioning…
During a news conference in Florida today, Donald J. Trump—a man who is running for what is arguably the most powerful job in the world—challenged Russia to hack into opponent Hillary Clinton’s email.
The FBI is facing accusations that malware it deployed while running Operation Playpen, a sting that infiltrated and maintained a dark web child pornography website for two weeks and eventually led to more than 100 arrests, was illegal. But the agency swears that using malware was good because, well, the FBI had good…
Nexus phones are essential tools for any Android fan or developer because of their lack of bloatware and regular system updates. Now, thanks to tweaks to the latest version of the operating system, it’s not that difficult to get a Nexus-style experience on any handset. Here’s how you can do it.
You’ve probably seen mention of the Raspberry Pi in your travels across the internet, but what exactly is this compact piece of circuitry? What can you do with it and why would you want to? If you’re new to the life of Pi then we’re here to explain everything you need to know and then some.
North Korea has been laying the groundwork for a massive cyber attack against South Korea, government officials from South Korea told Reuters.
Nintendo’s Power Glove is a favorite among hackers looking for new uses for the decades-old peripheral. This latest project puts humanity in dominion over our quadcopter subordinates.
Security researchers have identified “strong links” between recent Swift bank attacks, one of which was foiled by a typo, and the Sony Pictures hacks of 2014.
Primavera de 1983 en Camp David (Maryland). El 4 de junio por la noche el presidente Reagan está solo en la residencia, así que decide que es un buen momento para finalizar el día con una película. Reagan acaba viendo esa noche WarGames (Juegos de Guerra). Días más tarde, aún impresionado por el recuerdo de la trama…
If your iPhone has been jailbroken without your knowledge, something fishy is probably going on. The only problem is, it can be impossible to tell that your iPhone has been jailbroken.
While the FBI was embroiled in a very public spat with Apple about unlocking an iPhone, it seems the LAPD may have been quietly unlocking another.
A report from Reuters suggests that over 270 million hacked email credentials—including those from Gmail, Hotmail and Yahoo—are circulating among Russian digital crime rings.
A proposed change to the ‘Federal Rules of Criminal Procedure’ issued yesterday by the United States Supreme Court allows federal judges to grant the FBI permission to hack multiple computers at once, including machines belonging to people who haven’t been suspected of a crime. It can even hack people the FBI knows to…
The hackers behind a large-scale Bangladesh bank hack went further than simply stealing money. Now it turns out that they created malware that could compromise the way in which international banks use the SWIFT payment system.
Sometimes it pays to spend. The central bank of Bangladesh has found that out the hard way, as police are blaming its loss of $80m during a hack on crappy $10 routers.
En febrero de 2015, el FBI organizó una operación para desmontar una red de pornografía infantil que operaba en la dark web. Hoy, un juez ha desestimado una de las principales pruebas contra el administrador de la página. ¿La razón? Que se obtuvo mediante malware.
You may remember that last year, a hacker exposed the inner workings of Hacking Team, a company that makes spyware for governments. Now that the dust has settled down, someone claiming to be the hacker has posted all the details on how he did it.
The Panama law firm Mossack Fonseca has spoken out about the huge data leak it’s suffered, claiming it’s been the victim of an external hack.