Hacking news, information, and how-to advice

iPhone 5c
Man trying to sleep in the middle of the night

151027 facebook headquarters 1

Facebook bug hunter stumbles on backdoor left by hackers

The backdoor script stole Facebook employee credentials from a corporate server

The FBI paid more than $1 million to hack the San Bernardino iPhone

We still don't know anything about where the hack came from or how it works, but we now know it was expensive

spying eye

Hacker: This is how I broke into Hacking Team

Account of the breach of surveillance vendor Hacking Team highlights lessons for all companies

space crime security cars iot startups

Behold the glorious future -- with the same old security

From delivery drones to implanted medical monitors, technology is about to become more incredible -- but not more secure

iPhone 5C

FBI will help US agencies with tools to unlock encrypted devices

The FBI did not commit on using the method tried on the San Bernardino iPhone

fbis most wanted cybercriminals

The FBI's 10 most wanted cyber criminals

The Internet has impacted the world in numerous ways, but it isn't always positive

160324 lynch

U.S. government accuses 7 Iranians of hacking banks, New York dam

The DOJ says the campaign that included DDoS attacks was carried out on behalf of the Iranian government

FBI shield

Vehicles 'increasingly vulnerable' to hacking, FBI warns

With the rising use of computers in vehicles, software vulnerabilities in networked vehicle systems could create new risks

hollywood sign

8 horrifying Hollywood computing cliches

We've all rolled our eyes at ridiculous misinterpretations of computer technology on TV or in the movies. These eight seem to pop up again and again


The ultimate hackathon survival guide

Name a city, pick a date, and you’ll likely find a nearby hackathon, whether you’re in Des Moines, Iowa, or Yerevan, Armenia.


DOD to invite security experts to Hack the Pentagon

The cyber bug bounty program is a first for the federal government, but you'll need to undergo a background check to enter

binoculars lookout

Companies detect breaches sooner, but attackers have gotten nastier

Organizations are getting better at spotting breaches -- nearly 30 percent sooner, according to a new report from Mandiant

uc berkeley campus

UC Berkeley makes third data breach disclosure in past 15 months

The institution prides itself on cutting-edge cyber security research

Internal Revenue Service IRS tax filing form 1040

IRS: Actually, that breach last year was way worse than we thought

The 'Get Transcript' cyber attack is now thought to have affected roughly seven times more taxpayers than originally estimated

code big data binary programming

Attackers can turn Microsoft's exploit defense tool EMET against itself

Exploits can trigger a specific function in EMET that disables all protections it enforces for other applications

security phishing hook

Sony attackers thought to be behind multiple large attacks

Security researchers have found similarities in malware and attack methods and now know what digital breadcrumbs to follow

20151005 cisco headquarters sign

Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking

Firewalls running Cisco Adaptive Security Appliance (ASA) software can be compromised remotely with malformed UDP packets

security 2016 cybercrime

5 tips to protect your admin credentials

Credentials are the main battlefront in our ongoing computer security war. Deploy everything you have to keep them safe

Load More