How to steal cash from an ATM using just an iPod nano and a piece of plastic
There’s a new and depressingly simple way to steal cash from ATMs and rob other people’s bank accounts, Business Insider informs us. Apparently, thieves have started …
There’s a new and depressingly simple way to steal cash from ATMs and rob other people’s bank accounts, Business Insider informs us. Apparently, thieves have started …
Verizon made headlines this week with the surprise $4.4 billion acquisition of AOL, but a new report from BuzzFeed reveals that a major security flaw …
Security researchers at Symantec recently discovered a new piece of malware that, believe it or not, incorporates a number of themes from the hit TV …
By now we’re all familiar with the upsides and downsides to the Google Play store’s approach to vetting apps: The upside is that it’s incredibly …
After a Motherboard report in March said that details for at least some Uber accounts had been accessed by hackers who were selling them online for …
Why are we so suspicious of law enforcement officials who are howling bloody murder about Apple and Google’s decision to encrypt smartphone traffic? Largely because …
We mostly think of hackers as people who use their knowledge of coding to virtually break into computer systems. It turns out, however, that hackers …
Last year, hackers hit the unclassified computer network of the White House, accessing in the process the email correspondence between President Obama and some of …
It’s very common these days for tech companies Google and Microsoft to offer hackers and security researchers big bucks if they’re able to find security …
Free public Wi-Fi hotspots are terrific. They offer users quick and reliable Internet connections where cellular reception is spotty. And even in areas with strong …
Well, let’s hope you never used the Galaxy S5’s fingerprint scanner. Forbes reports that researchers from security firm FireEye have found a scary flaw in …
Wondering how difficult it is for attackers to cripple your iPhone? The answer isn’t going to make you happy — in a nutshell, all the …
A “Rootpipe” backdoor in various Mac OS X versions, or a security flaw that could give hackers full access to a Mac without authentication, was …
A few weeks ago, Last Week Tonight’s John Oliver travelled all the way to Russia to interview Edward Snowden. Snowden, of course is responsible for numerous leaks that …
While security companies usually detail vulnerabilities in Android that hackers can use for malicious purposes, analytics service SourceDNA uncovered an encryption flaw that may affect as …
We’ve heard a lot of hysterical claims from law enforcement officials about all the awful things that will happen if Apple and Google encrypt their …
In a report released earlier this week, U.S. government watchdog group GAO (Government Accountability Office) warned that the increasing connectivity of our aircraft, from flight tracking …
If you thought your Facebook chats are safe from prying eyes, you’re apparently wrong. Bosnadev says that Facebook’s chats are being scanned by a CIA-funded …
Of all the malicious software out there that we have to be afraid of, ransomware may very well be the most sinister. As its name …
Edward Snowden was behind one of the biggest leaks of classified information in modern history. The only problem is that most of the information that …
This probably won’t come as much of a surprise, but Google is scanning every single app that finds its way on to your phone, whether …
Concerns about Android malware really are overblown many times — after all, you’re most likely safe as long as you only download apps from the official …
By now you’ve undoubtedly heard of Verizon’s “supercookies,” the unstoppable tracking cookies that Verizon uses to track every single unencrypted website you visit on your …
Hackers may have hit Uber and stolen user account details including log-in credentials, full names, the last four digits of credit card numbers and telephone …
Because people are generally unable to come up with rock-solid passwords on their own, many websites that require user-generated passwords employ “password strength meters” which inform users …
Recent reports have shown that Wi-Fi routers are frequent targets for hackers who try to reroute some of the Internet traffic from the homes of unsuspecting …
The many Snowden revelations, which have detailed the advanced spying and mass data collection operations conducted by some of the world’s most important agencies including the …
Given the myriad of security mechanisms and technologies tech companies have developed, it’s easy to fall into a sense of complacency and think that what you’re …
While the NSA certainly has the technical chops to eavesdrop, monitor, and intercept all types of electronic communications, they’re also not afraid to employ more …
A new spy tool that’s being referred to as StingRay or KingFish is a sophisticated cell phone spying and tracking tool that’s so secret that …