How to Protect Your Privacy from Facebook Graph Search
• technewsdaily.comYou can run. You can hide. But you still won't be safe from Facebook's Graph Search.
ON AIR NOW
Click to Play
You can run. You can hide. But you still won't be safe from Facebook's Graph Search.
Hackers who wiped tens of thousands of PC hard drives in South Korea earlier this year also appear to be targeting the country's military secrets, according to a report.
In 2010 the National Security Agency (NSA) taught Edward Snowden how to turn the world's largest spy agency inside out.
A few hours before making this video, Luke Rudkowski of WeAreChange.org received an email from an anonymous sender claiming to be a Bilderberg whistleblower with attached photos from inside the 2013 Bilderberg meeting at the Grove Hotel in Watford, E
On this episode of South2North, Redi talks to three experts about the war we do not see. It does not involve guns and bullets, but its effects can be just as dangerous to the world we live in - cyberwar.
A team of hackers from the Department of Computer Science at the University of Washington conducted a study in 2010 which concluded that all cars equipped with antilock brakes sold in the U.S. can be hacked.....
In the wake of recent revelations that the National Security Agency (NSA) and other government snoops are monitoring the electronic communications of U.S. citizens, millions of us wanted to know what, if anything, we could do to protect our email, ce
Quick! What's the most commonly pirated PC application?
Muslim hackers operating out of the Middle East have launched #OpPetrol, yet another online attack planned by the group that dubs itself "Anonymous."
In a startling move, Microsoft caved in to industry pressures today and announced that, for the first time, it would be offering cash rewards for security vulnerabilities in its software — a "bug bounty," in hacker parlance.
Ex-CIA contractor speaks to reporter from secret location in Hong Kong, revealing fresh details of US surveillance, pressure on Hong Kong, snooping and cyber attacks on China.
The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze.
In the never-ending arms race between secret-keepers and code-breakers, the laws of quantum mechanics seemed to have the potential to give secret-keepers the upper hand
Your private conversations aren’t that private. In fact, the government is tapped into the servers of the top technology companies.
Researchers work to develop passwords so secret that only your unconscious mind knows them.
If an online seller sends you photos of an item, run them through a malware scanner first — at least according to the FBI.
As a teenager in the early 90s, Peter Chu was obsessed with an online game called DikuMUD. He spent countless hours playing this Dungeons-and-Dragons-like computer creation, but playing wasn’t enough.
The newest threat to Android is an app that promises users security for their mobile devices.
Officially, Ryan Christopher Fogle worked as a junior diplomat at the U.S. Embassy in Moscow.
Scammers are using LinkedIn to give their garden-variety cons an added air of legitimacy as they attempt to part gullible Internet users from their cash.
Dummy water-plant control systems rapidly attracted attention from hackers who tinkered with their settings—suggesting it happens to real industrial systems, too.
Google has committed more hacking and Internet crimes than any other institution in history
Cyber-espionage targeting U.S. government and business entities appears “to be attributable to the Chinese government and military,” the Pentagon charged Monday in the U.S. government’s most explicit public accusation to date against Beijing.
GridCom Technologies says quantum cryptography can work to make the electricity grid control systems secure.
Researchers hacked into a building control panel showing the layout of water pipes in Google’s third floor at its Australia headquarters
The United Kingdom is worried about not having enough cybersecurity professionals in the near future.
A 24-year-old Algerian man landed in Atlanta, Georgia on Thursday to face federal charges that he hijacked customer accounts at more than 200 banks and financial institutions, capping a months-long extradition battle.
Bitcoin. Everybody’s talking about it. What’s true, and what’s hype? Perhaps the only thing that’s clear about Bitcoin is that it’s not going away anytime soon. Who am I to say? I’m not an economist; I’m a hacker
On Monday, July 6, 2009, two engineers from Nevada’s Gaming Control Board showed up at the Silverton Casino Lodge.
Not even Google Glass can stand up to the itchy fingers of famed iPhone hacker Jay Freeman.