Why your password isn’t as safe or secure as you think
Because people are generally unable to come up with rock-solid passwords on their own, many websites that require user-generated passwords employ “password strength meters” which inform users …
Because people are generally unable to come up with rock-solid passwords on their own, many websites that require user-generated passwords employ “password strength meters” which inform users …
Recent reports have shown that Wi-Fi routers are frequent targets for hackers who try to reroute some of the Internet traffic from the homes of unsuspecting …
The many Snowden revelations, which have detailed the advanced spying and mass data collection operations conducted by some of the world’s most important agencies including the …
Given the myriad of security mechanisms and technologies tech companies have developed, it’s easy to fall into a sense of complacency and think that what you’re …
While the NSA certainly has the technical chops to eavesdrop, monitor, and intercept all types of electronic communications, they’re also not afraid to employ more …
A new spy tool that’s being referred to as StingRay or KingFish is a sophisticated cell phone spying and tracking tool that’s so secret that …
We all know that our data is only as safe as the devices we store it on, but we also like to think that the …
A new report from The Intercept claims that both the CIA and British intelligence have, for years, been working hard to skirt around the “layers of …
More and more security threats are discovered on a regular basis, and now it’s turn for a “Freak” vulnerability — that’s actually its name — for …
The dangers of mobile malware are very real, and we’re now reminded yet again how quickly these malicious programs can spread thanks to a new …
It apparently hasn’t taken very long for scammers to figure out ways to commit fraud with Apple Pay. The Guardian’s Charles Arthur writes that some …
A new Snowden leak a few days ago revealed that the NSA and GCHQ conducted a complex hack operation that focused on obtaining the secure encryption …
Following reports that claimed the NSA and GCHQ may have targeted Gemalto, one of the main phone SIM cards makers, the company revealed that such attacks …
I’ve long wondered which would be worse for Lenovo — if the company decided to install the Superfish adware onto its machines despite knowing its …
About 18 months ago, reports indicating that the NSA spied on the private communications of Brazilian President Dilma Rouseff began to surface. Now comes word via …
We’ve written extensively about security concerns in recent weeks, but this might be the most shocking development yet. Reddit user FallenMyst posted on Tuesday that …
A few days ago, a report revealed that spy agencies including the NSA and GCHQ, managed to bypass the security of SIM card manufacturer Gemalto …
News broke late last week that Lenovo had been shipping laptops with man-in-the-middle adware preinstalled which could hijack HTTPS traffic and insert its own ads onto websites …
Lenovo has been justifiably catching a lot of grief this week for preloading dangerous adware called Superfish onto its computers that hijacks HTTPS traffic to …
After news broke this week that Lenovo was putting dangerous adware on its computers, the company responded by removing the offending software from new machines …
Android’s malware problem might be overstated, but that doesn’t mean you shouldn’t be cautious when navigating the web on your device. On Wednesday, anti-virus software …
If you follow anything having to do with tech on the Internet, you have undoubtedly read something about Superfish in the past 24 hours. In a …
In a bombshell report published on Thursday, Jeremy Scahill and Josh Begley of The Intercept detail how the NSA and British Intelligence operatives managed to …
We’ve seen plenty of companies score own goals over the years, but this one is still quite a doozy. PCWorld reports that security researchers recently discovered …
A new report published by Alcatel-Lucent’s Motive Security Labs division says that no less than 16 million mobile devices were hit by malware last year, …
Spy agencies have some very smart tools at their disposal for their surveillance and data gathering operations, many leaks have revealed so far, but Russian …
Following the many Snowden leaks that revealed some of the advanced mass data collection practices employed by spy agencies including the NSA and GCHQ, a …
When hackers steal money from banks, they usually go for Bonnie and Clyde attacks, taking whatever they can take in a single grab, one Kaspersky …
Earlier this week, noted security researcher and consultant Mark Burnett made waves when he posted 10 million stolen usernames and passwords on his blog. Of …
Still looking for a reason to upgrade to iOS 8? Security firm Trend Micro released a report on Wednesday revealing that some of the most …