The son of a prominent Russian politician has been convicted in Seattle of 38 charges related to stolen credit card information, including 10 counts of wire fraud and nine counts of obtaining information from a protected computer, the Justice Department announced on Thursday.
NSO Group, a company that sells hacking services to governments so they can spy on journalists and dissidents, exploited gaping security holes in iPhone software, according to a report byLookout Security and Citizen Lab. But don’t worry: Apple just pushed a fix.
Citing government sources, CNN is reporting that reporters at US news outlets, including The New York Times, are being targeted by Russian hackers. The FBI is currently investigating the hacks.
What do you do with your old Game Boy? Some of us try and boot it up for the first time in decades, while others look at this brick that we played with in our childhood and make something of it.
Last Friday, a mysterious group by the name of “The Shadow Brokers” dumped what appeared to be some of the National Security Agency’s hacking tools online. There was some speculation as to whether the tools were legitimate. According to The Intercept, these tools are mentioned in documents leaked by NSA whistleblower…
There’s a lot of misinformation about security online. The truth is that by taking a few simple steps you can make yourself much safer. Here are the basic, super easy ways to do it:
Hackers say they’ve breached a hacking group known as the Equation Group, which is widely speculated to be an offshoot of the National Security Agency. The hackers have provided some files including what could be parts of the agency’s surveillance tools, but are demanding millions of dollars in bitcoins for the rest.
Chris Rock, an independent security researcher, is pissed that the Director of National Intelligence, James Clapper, is more afraid of ISIS than hackers. He’s hoping to change that by teaching hackers how to overthrow governments.
What if humans didn’t have to respond to major hacks or breaches in the networks they operated, and computers could just do it automatically? That’s a question being asked by DARPA, the US military’s boldest research arm, which set up a multi-million dollar challenge to answer that question.
Microsoft’s amazing HoloLens is the world’s first stand-alone headset that lets users see virtual objects and environments as if they existed in the real world. This device’s entertainment potential is practically unlimited, but as a Hackathon team recently demonstrated, it can also be used to rewire a malfunctioning…
During a news conference in Florida today, Donald J. Trump—a man who is running for what is arguably the most powerful job in the world—challenged Russia to hack into opponent Hillary Clinton’s email.
The FBI is facing accusations that malware it deployed while running Operation Playpen, a sting that infiltrated and maintained a dark web child pornography website for two weeks and eventually led to more than 100 arrests, was illegal. But the agency swears that using malware was good because, well, the FBI had good…
North Korea has been laying the groundwork for a massive cyber attack against South Korea, government officials from South Korea told Reuters.
Nintendo’s Power Glove is a favorite among hackers looking for new uses for the decades-old peripheral. This latest project puts humanity in dominion over our quadcopter subordinates.
Security researchers have identified “strong links” between recent Swift bank attacks, one of which was foiled by a typo, and the Sony Pictures hacks of 2014.
If your iPhone has been jailbroken without your knowledge, something fishy is probably going on. The only problem is, it can be impossible to tell that your iPhone has been jailbroken.
While the FBI was embroiled in a very public spat with Apple about unlocking an iPhone, it seems the LAPD may have been quietly unlocking another.
A report from Reuters suggests that over 270 million hacked email credentials—including those from Gmail, Hotmail and Yahoo—are circulating among Russian digital crime rings.
A proposed change to the ‘Federal Rules of Criminal Procedure’ issued yesterday by the United States Supreme Court allows federal judges to grant the FBI permission to hack multiple computers at once, including machines belonging to people who haven’t been suspected of a crime. It can even hack people the FBI knows to…