Hacking

Hacking | News, how-tos, features, reviews, and videos

VMware

VMware patches critical virtual machine escape flaws

Four vulnerabilities demonstrated during the Pwn2Own hacking contest were fixed in VMware ESXi, Workstation and Fusion.

3234554

Trump extends Obama executive order on cyberattacks

The ability for the government to sanction cybercriminals will last for at least one more year

Google Play

Google Play faces cat and mouse game with sneaky Android malware

What’s the best way to avoid Android malware? Downloading all your apps from the Google Play store -- where software is vetted – is perhaps the best advice. But that doesn’t mean Google Play is perfect.

p1200588

Hackers threaten to wipe millions of Apple devices, demand ransom

A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them $150,000

FBI Comey

FBI looks into Russian hack of US election, possible Trump involvement

Comey confirms government investigation into 'the nature of any links' between the Trump campaign and the Russian government, and shoots down Trump claims that former president wiretapped Trump Tower

dsc06024

Yahoo breach exposes the drawbacks of state-sponsored hacking

Relying on private hackers gives governments some deniability, but it can bring the whole scheme down

The Russian flag

US faces limits in busting Russian agents over Yahoo breach

Wednesday's indictment is more about naming and shaming Russia over suspected state-sponsored hacking, experts said

twitter counter hacked

Twitter accounts hacked, Twitter Counter steps forward as culprit

It's the second time in four months that Twitter Counter has allowed hackers to post messages to high-profile Twitter accounts

security code big data cyberespionage DDoS

Mirai is the hydra of IoT security: too many heads to cut off

Some botnets have been disbanded, but new uses continue to emerge

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Software vendors will fix these vulnerabilities, but users should remember that there are always zero-day exploits out there

alert hacking threat detected

How Android and iOS devices really get hacked

There are many ways to hack mobile devices, but the method people worry about is hard and relatively uncommon. You're more likely to get phished first

wikileaks

WikiLeaks will share CIA hacking details with companies, but can they use it?

The White House is reminding companies that accepting classified information is illegal

Trump inauguration

Pence used private mail for state work as governor, and account was hacked

The vice president’s AOL account -- which he used repeatedly to transact state business when he was governor -- was reportedly hacked

yahoo mail

Yahoo execs botched its response to 2014 breach, investigation finds

Yahoo's security team knew an intrusion had occurred in 2014, but the company failed to properly investigate, an internal committee has found

first google

Old Windows malware may have tampered with 132 Android apps

More than 130 Android apps containing some malicious coding managed to infiltrate the Google Play store, possibly because the developers’ tools that built them were tainted, according to security researchers.

screen shot 2017 02 27 at 4.33.35 pm

Smart teddy bear maker faces scrutiny over data breach response

A security researcher claims he contacted the company about the breach weeks ago, but never received a response

RSA 2017 cybersecurity conference

Experts at RSA give their best cybersecurity advice

Users and businesses can protect themselves with these tips

artificial intelligence ai a.i.

A.I. faces hype, skepticism at RSA cybersecurity show

RSA's CTO is warning customers to be careful when buying products marketed as machine-learning

yahoo mail

Yahoo warns users of account breaches related to recent attacks

'A forged cookie may have been used ... to access your account'

ceo email scam spoof

Security researchers trick 'CEO' email scammer into giving up identity

Dell SecureWorks is encouraging businesses to use these tips to fight back against phishing schemes

Load More