A band of vandals is taking credit for doxxing some 1,400 American military and government personnel. Identifying themselves as the Islamic State’s “hacking division,” the group is telling its followers to “act and kill” the infidels. That threat rings somewhat hollow—because ISIS is bad at hacking.
As Apple had its annual celebration of its own awesomeness, I tuned in to see how Apple’s new operating system will provide better security and privacy to its users.
As ambitious politicians announce their plans to run for president in 2016, you can be sure that cheeky hackers are gearing up for some good pranks. Who will they hit? Nobody can be sure, but a former developer for the Obama campaign just posted a side-by-side comparison of the security protections on the top four…
The only thing that sucks worse than doing taxes is a hacker stealing your identity, doing your taxes for you, and then depositing your return in a random bank account, where it can later be transferred to Nigeria. Sound impossible? It's not, according to the story of an unlucky man named Michael Kasper.
Hotel internet is so far from secure—it's downright scary. You should know this by now. However, a new report from cyber security researchers suggests that issues with shitty security at hotels extend far beyond hackable Wi-Fi networks. Entire systems at some of the world's top hotel chains are very, very vulnerable.
New details have emerged about exactly how Hillary Clinton secured the homebrew private email servers she used as Secretary of State. The punchline? Clinton didn't encrypt her emails or use a certificate for her first three months running the State Department.
Tor is transforming. The anonymity service is making a concerted effort to find funding sources other than the United States government, the problematic sugar daddy that's bankrolled Tor for years.
Phishing scams are often obvious. For example, a hacker bot just emailed some Gizmodo writers with the subject line: "Send your full contact informations for a do na ti on claims." LOL not a chance. But dangerously convincing phishing scams definitely exist.
Spies and cops can use your smartphone to track your movements. That's no mystery—most smartphones come with a GPS chip that makes it pretty damned simple. So if you don't want to be tracked, you just turn off the GPS feature, right? Unfortunately, there is another way prying eyes can follow your movements:…
A consortium of tech companies adopted a new standard in December intended to usher in a more secure future without the hassle of passwords. On Friday, Microsoft announced that Windows 10 will incorporate those specifications, enabling new biometric identification features like fingerprints and eye-scans. Good job,…
A security researcher recently made a seriously startling discovery. With just four lines of code, he says he could delete any photo album on Facebook. Zuck's wedding photos? Zap. Your high school graduation album? Lost forever. Lucky for you, he decided to report the bug to Facebook, which promptly cut him a check.
Senator Ed Markey recently asked all of the major car companies for information about how they protect drivers' security and privacy in cars with wireless technology. The answers were not good.
It's kind of the oldest trick in the book. Catfishing is where you pretend to be someone you're not online so that you can trick someone else into doing something. And based on a new report, this is exactly how pro-Assad hackers have been robbing intel from opposition forces: They've been posing as hot girls on Skype…