Scientists in Switzerland said on Friday they had devised software that can swiftly trace terror suspects, computer viruses, rumour-mongering and even infectious diseases back to their source.
The perils of modern dependence on Internet-linked gadgets and digitally-stored memories remained a hot topic on Friday in the wake of a hack that wiped clean a Wired reporter’s devices.
Every big online security breach seems to end in a big lecture. Use strong passwords, users are told. Make fresh logins for every website. Back up your data. Encrypt all your stuff.
A new virus dubbed Gauss has attacked computers in the Middle East spying on financial transactions, emails and picking passwords to all kind of pages.
The big news this week was the hijacking of Wired reporter Mat Honan's iCloud account.
In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages
Hackers took over the blogging platform of the Reuters news agency and posted “fabricated” stories said to include an interview with a Syrian rebel leader, the company said Friday.
The WiFi at the annual Defcon hacker conference has long been inhabited by a battery of live and automated mischief makers that sniff packets, scan ports, and exploit whatever weaknesses can be found.
The automated system designed to keep malware out of Google's app store proves easy to evade.
The Internet should be adapted to allow for oversight by the National Security Agency, the organization's boss says.
As hackers from around the world converged on Las Vegas, Microsoft doled out a quarter million dollars in prize money to researchers who found ways to thwart attacks on its software.
Air traffic control software used around the world could be exploited by hackers to unleash squadrons of ghost planes to befuddle those entrusted to keep the skies safe, a security researcher said Thursday.
US spy master Keith Alexander courted hackers at an infamous Def Con gathering rife with software tricksters wary of police and ferociously protective of privacy.
At this year's Black Hat hacker conference in Las Vegas, attention turns from defense to offense.
Apple pitched security measures in its mobile gadgets on Thursday during its first presentation at a premier gathering of hackers and those intent on thwarting cyber attacks.
A cyber security researcher will demonstrate a toolset later this week which allows users to break into so-called “smart meters” that control a structure’s access to the power grid and water utilities, potentially enabling the user to modify the repo
Computer geeks planning to attend the world's largest annual hacking party in Las Vegas next week will have a rare chance to talk to the head of the US National Security Agency – the first such high-ranking official to attend ever.
As most of you know we were down for almost 15 hours today. To make a long story short we were hacked.
At a hacker conference in New York on Friday, a German security consultant demonstrated just how "disruptive" 3-D printing can really be.
Who knew that when the Messiah arrived to herald the Day of Judgment he’d first root through computers to steal documents and record conversations?
Usernames and unencrypted passwords posted online after hack attack on Yahoo Voice network More than 450,000 usernames and unencrypted passwords appear to have been stolen from Yahoo Voice, a user-contribution services on Yahoo’s network, and post
Frustrated by the lack of impact from Anonymous’ otherwise famous hacks and data dumps, and the slow pace of material coming out of WikiLeaks, participants in the Anonymous collective have launched a WikiLeaks-like site called Par:AnoIA
Apple’s 2012 Friday the Thirteenth turned memorable for the company yesterday with news outside Apple traveling fast and furious that a hacker was offering instructions on a YouTube video, telling iOS users how to wrest free access to paid iOS app co
ANCHORAGE, Alaska — Several electronic road construction signs around Anchorage were hacked late Wednesday night or early Thursday morning, according to the state Department of Transportation.
On the evening of June 19, a group of researchers from the University of Texas successfully hijacked a civilian drone at the White Sands Missile Range in New Mexico during a test organized by the Department of Homeland Security.
Apple has made a small change to a Mac marketing webpage that is a big deal to people who care about computer security.
In 1992, former hacker Jeff Moss invited a bunch of hacker friends he'd met primarily on electronic bulletin boards to come to Las Vegas to party in the desert. That party grew into a legendary conference that's become one of the premiere gatherings
Two British members of the hacking group LulzSec admitted Monday carrying out cyber attacks against the CIA and Rupert Murdoch’s British newspaper group News International.
The United States government is developing a computer system that would allow it to conduct cyber warfare without the intervention of a human programmer.
Accusations the US and Israel jointly created the computer virus Flame have been printed by the Washington Post newspaper.