Facebook’s aggressive plan to block revenge porn still has one flaw
Facebook on Wednesday announced a new plan to fight revenge porn, a term coined to describe the practice of sharing private pictures of a person …
Facebook on Wednesday announced a new plan to fight revenge porn, a term coined to describe the practice of sharing private pictures of a person …
A few months back, we covered a nasty and incredibly advanced piece of malware dubbed Pegasus. Created by a relatively obscure Israeli security company called …
You’d have to be living under a rock to have missed the current insanity over the repeal of proposed broadband privacy rules which swiftly made …
The International Association of Athletics Federations (IAAF) has been hacked by the shadowy ‘Fancy Bears’ group, officials said Monday, warning that athletes’ data may be …
With the decision by the US government to roll back privacy protections for citizens and allow companies to log, market, and sell the internet browsing …
There’s a group of hackers out there that claims it can reset hundreds of millions of iPhones by using stolen iCloud credentials. The attack should occur …
Apple confirmed on Thursday that its servers were not hacked, after reports earlier this week claimed that hackers are holding hundreds of millions of accounts for ransom. …
Yesterday morning, Wikileaks released a treasure trove of documents detailing the arsenal of software tools the CIA uses to hack into targeted iPhones and Macs. While most …
After news had emerged earlier this week that a hacker group called Turkish Crime Family (TCF) is holding millions of Apple ID accounts for ransom, …
Earlier this month, Wikileaks dropped a massive amount of classified information purportedly from obtained from the CIA. The leak revealed how the government agency has repeatedly …
A hacker group claiming to have access to hundreds of millions of iCloud accounts threatened to remotely wipe iPhones associated to these accounts unless Apple pays …
The Trump administration has a serious Russia problem right now, as it still can’t completely dissociate itself from the long shadow Putin’s Russia has cast …
Apple’s iPhones and Apple IDs are a tough nut to crack for hackers, but it’s not impossible. At least that’s what a group of hackers …
A few months ago, a Twitter troll allegedly sent a seizure-inducing image to a journalist, thinking that an anonymous prepaid SIM card and a throwaway Twitter …
Every year, skilled coders at the annual Pwn2Own hacking conference get to work and remind us that no piece of software is impervious from targeted attacks. Last …
More details about the activities that led to one of the biggest data breaches in history are coming to light now that the Department of …
The Department of Justice on Wednesday identified four people, including two Russian spies and two criminal hackers, as the main suspects behind one of the …
WhatsApp and Telegram are two instant messaging apps that have more than a billion users between them. They offer encrypted communications, convenient messaging, and a …
Why are the Windows and Android platforms always targeted by malware and other malicious attacks from nefarious hackers? Because they’re used by so many people …
It’s been an uneasy few months for Yahoo, which had to disclose three different large-scale breaches, two of which affected more than one billion accounts in total. The …
A variety of prominent verified Twitter accounts belonging to top media companies and politicians spread messages containing swastikas and Nazi references a few hours ago. …
French tech executive Nicolas Thibaut has been working for a few years now on a concept that’s morphed a bit in response to changing digital …
Keeping malware off of your mobile device should be a top priority for anyone who purchases a new smartphone or tablet, but what if the …
In the massive dump of nearly 9,000 purported internal CIA documents released earlier this week by Wikileaks, Apple was featured prominently. Many of the pages …
On Wednesday, a security expert noted that hundreds of millions of Android users are at risk following recent revelations resulting from the cache of top-secret …
Of all the mobile devices featured in the alleged CIA documentation dump released by Wikileaks earlier this week, the iPhone is mentioned the most. Pages …
Earlier this week, WikiLeaks shocked the world by releasing a treasure trove of alleged classified CIA documents that appear to have pulled back the curtain …
WikiLeaks yesterday published an absolute treasure trove of data detailing how the CIA utilizes specialized software and hacking tools to successfully infiltrate, spy on, and …
Wikileaks just dropped a massive collection of information detailing how the US government is attacking the devices that many of us use every single day …