Reasons to never rely on fingerprints over passwords
Touch ID and other fingerprint scanning technologies are wonderfully convenient additions to our smartphones that enable easy mobile payments and quick device unlocking. However, Elliot …
Touch ID and other fingerprint scanning technologies are wonderfully convenient additions to our smartphones that enable easy mobile payments and quick device unlocking. However, Elliot …
All the annoying checks you go through before boarding a plane are supposed to increase security and thwart terrorists’ ambitions. But it looks like these …
Even people who aren’t normally fans of Anonymous probably won’t object to the hacker collective using its powers to take on Islamic State, the hated …
While it sounds like a mobile game you’d play to kill time, hackers vs. terrorists is sadly a real war. The hacker collective that goes …
After a report had indicated the PlayStation 4 console as a potential way to conduct secure in-game communication that can’t be tracked, a new report …
Want to impersonate another person’s email account? It’s shockingly easy to do, as a new Gmail bug reported by independent security researcher Yan Zhu reveals. Speaking …
Late on Friday night, Paris was brutally hit in a highly coordinated terrorist attack that ISIS later claimed responsibility for planning. At least 127 people died in …
A new mobile exploit recently unveiled at the MobilePwn2Own panel at the PacSec conference this week enables an attacker to take control of any Android …
BlackBerry isn’t the only company that should be rooting for the new BlackBerry Priv smartphone to be a success — Google should be rooting for …
About three weeks ago, a team of teenage hackers managed to hack into the personal AOL email account of CIA Director John Brennan. In the process, …
You can’t make a good omelet without breaking a few eggs. Similarly, you can’t take over the smartphone business without compromises, even if that means …
We’ve seen ransomware stories popping up left and right this year, detailing how hackers are making money from a scary, yet creative, type of malware. Just as …
The latest adware outbreak might be the worst yet for Android users. According to researchers from cybersecurity company Lookout, a new strain of adware is capable …
Security flaws? Oh, Android has a few and most Android users have to wait a long time to get them patched… if they even get …
Earlier this fall, a security agency known as Zerodium announced that it would be willing to pay out $1 million to any hacker or team …
For almost two years now, security breaches of all sorts have made the news. Hackers attacked retail stores and stole credit card numbers and other data, …
Using weak passwords makes you a prime target for hackers, who have shown over the years that they can eat such subpar security measures for …
Online banking can make life more convenient although it does come with annoyances of its own, including requirements for two-factor authentication and security questions. Capital …
Historically, the Mac has been much less prone to various types of malware attacks than Windows machines. Of course, this is largely due to the …
Days after the email hack of CIA Chief John Brennan was originally reported by the New York Post, WikiLeaks announced that it has obtained the contents …
Fitbits are popular devices among people who like to track their steps and exercise. But new research reveals that a Fitbit device is unprotected against simple malware attacks. More …
Some Edward Snowden leaks have revealed that the NSA and other intelligence agencies can break encryption barriers for mass surveillance purposes. It has been theorized …
A teen hacker and two other people managed to hack CIA Director John Brennan’s personal email, revealing sensitive information from his email account. The group used various social-engineering …
I love how “evil” Google is. Do you hear that, Google? I want you to have all of my data, as long as you keep …
Right on the heels of a major malware attack on the App Store, mobile analytics service SourceDNA discovered another potential security breach in the form of …
We’ve become accustomed to malware that invades our browsers — showing us ads we don’t want to see and collecting our information without any warning …
Has your Facebook account ever come under attack by a hacker employed by Vladimir Putin or the NSA? Is probably hasn’t but that isn’t stopping …
TeslaCrypt doesn’t mean anything to many PC users, but there are thousands of people who have somehow contracted this infectious malware program that imprisons personal files …
The New York Police Department has equipped x-rays in some of its vans but it’s refusing to talk about them due to “security concerns.” Even …
In what can only be described as a major security lapse, it seems some hackers from Russia successfully broke into the servers of Dow Jones, …