Meet the mad scientist who wrote the book on how to hunt hackers security.cyber Article 2249 words 8 votes
Hackers are breaking directly into telecom companies to take over customer phone numbers security Article 984 words 10 votes
Hackers can use lasers to ‘speak’ to your Amazon Echo or Google Home security amazon google.home Article 1378 words 10 votes
Hackers steal secret crypto keys for NordVPN. Here’s what we know so far. Article 1305 words 29 votes
Swedish police can use spyware to hunt criminal gangs – police to use the latest technology to access everyday encrypted apps used by criminals Link 8 votes
Elevator hacking: From the pit to the penthouse security Video 1:55:54, published Aug 5 2014 16 votes
Web scraping doesn’t violate anti-hacking law, appeals court rules internet Article 821 words 12 votes
Twitter CEO Jack Dorsey's account was compromised, sent public tweets and retweets including racial slurs security social media Article 76 words 17 votes
New ‘warshipping’ technique gives hackers access to enterprise offices security Article 593 words 8 votes
Sneaker and fashion marketplace StockX was hacked, with almost seven million records stolen privacy security Article 379 words 9 votes
Ottawa city hall has been targeted by cyber attacks more than 8,000 times in the past year security.cyber Article 608 words 8 votes
Hackers, farmers, and doctors unite! Support for right to repair laws slowly grows apple Article 921 words 6 votes
Florida city to pay $600K ransom to hacker who seized computer systems weeks ago security.cyber Article 5 votes
Behind the scenes with the hacktivists who took on Microsoft and the FBI microsoft Article 1882 words 4 votes
Car hackers say that if you want to keep your autonomous vehicles secure, you have to create realistic threat models security Article 1013 words, published Apr 18 2019 4 votes
Hackers tricked a Tesla, and it's a sign of things to come in the race to fool artificial intelligence Article 997 words 13 votes
Hackers hijacked ASUS software updates to install backdoors on thousands of computers Article 2541 words 10 votes
Tim Berners-Lee: 'Stop web's downward plunge to dysfunctional future' internet Article 643 words 8 votes
New Japanese law lets government hack IOT devices and warn owners they're vulnerable security Article 606 words 8 votes
Marriott admits hackers stole data on 500 million guests; passports and credit card info included privacy security.cyber Article 585 words 21 votes
Two scenarios of Chinese hacking of Australian companies internet Text 20 words China uses the cloud to step up spying on Australian business How China diverts, then spies on Australia's internet traffic 5 votes
Amazon pulls ads from Bloomberg, and Apple did not invite Bloomberg to its Oct. 30 event—both allegedly over China hacking story apple amazon Article 372 words 18 votes
Internet hacking is about to get much worse - We can no longer leave online security to the market security internet Article 1590 words 22 votes
Facebook "View As" security issue affecting fifty million accounts: "attackers exploited" it to "steal Facebook access tokens" and "take over people’s accounts" social media security Article 501 words, published Sep 23 2018 21 votes
Police body cameras are hackable and policy lags behind, warns security analyst security Article 993 words, published Sep 21 2018 6 votes
For hackers, anonymity was once critical. That’s changing. security privacy Article 2431 words 10 votes
How an international hacker network turned stolen press releases into $100 million Article 6934 words 12 votes
Ajit Pai knew DDoS claim was false in January, says he couldn’t tell US Congress Article 1437 words 32 votes
‘It’s our time to serve the Motherland’ How Russia’s war in Georgia sparked Moscow’s modern-day recruitment of criminal hackers security.cyber Article 3991 words 6 votes
Reddit servers breached; full backup from 2007 (including hashed+salted passwords) obtained by attackers security social media Link 77 votes