Selling used Android phones poses huge identity theft risk, expert says
Android users who are looking to sell their old devices should be wary of the possible consequences. McAfee identity theft researcher Robert Siciliano warned that …
Android users who are looking to sell their old devices should be wary of the possible consequences. McAfee identity theft researcher Robert Siciliano warned that …
Using nothing more than a few common tools, hackers can reportedly recover credit card numbers and other personal information from used Xbox 360 consoles even …
As a standard security measure, Apple’s iPhone can be set to require a four-digit passcode whenever the phone’s screen is powered on in order to …
Researchers from North Carolina State University have found that mobile applications that integrate advertisements pose privacy and a security risks. The team conducted a study …
Hacker group “Anonymous Operations” has confirmed that the custom Linux-based operating system released under its name earlier this week is not a platform it developed. …
On Wednesday, a Russian hacker discovered a vulnerability in Google’s Chrome web browser during CanSecWest’s Pwnium hacker contest. It was the first time in four years …
Hackers associated with the group “Anonymous” have published Symantec’s Norton AntiVirus source code on The Pirate Bay. The source code was stolen in 2006 and …
Russian university student Sergey Glazunov was able to hack into a secure Windows 7 machine using a remote code execution exploit in Google’s Chrome web …
The United States Transportation Security Administration recently invested $1 billion in body scanner technology it claimed would make air travel safer, but the scanners have come …
Legislation signed by President Obama directs the Federal Aviation Administration to allow remotely controlled drones to be used by law enforcement agencies, DGR News Service …
The laughs are reportedly over for five top members of the hacker group LulzSec who were arrested on Tuesday and charged as part of a conspiracy …
Hackers targeted NASA computers, successfully gained access to employee credentials, and took control of systems at NASA’s Jet Propulsion Laboratory, CNN reported on Friday. Paul …
Earlier this month it was revealed that the popular social networking app Path was uploading entire iPhone address books to the company’s servers without first gaining …
It was recently revealed that Google and a number of advertisers had found a way to bypass some privacy features in modern web browsers, allowing …
Google on Monday responded to a new round of finger pointing, this time from Microsoft, which claimed Google was using falsified cookie policies to bypass …
Members from the notorious hacktivist collective “Anonymous Operations” have reportedly claimed responsibility for hacking two more government websites following the takedown of the Central Intelligence …
Last week it was discovered that a number of popular iPhone apps were invading users’ privacy and uploading entire address books to external servers. The data …
Last week, two exploits concerning Google Wallet left users questioning the service’s security. One of the exploits allowed hackers to bypass PIN protection, but it was …
Path caused quite a stir last week when it was discovered that the app secretly transmitted users’ entire contact lists to its servers. Without giving …
Two recently uncovered security exploits concerning Google Wallet have left users questioning just how safe the product really is. A security firm exposed a vulnerability last …
Hackers from the notorious group “Anonymous Operations” claim to have taken down the United States Central Intelligence Agency’s website shortly after 3:00 p.m. EST on Friday. …
A new exploit has been discovered that allows unauthorized access to a user’s Google Wallet account with a simple hack that can be performed by …
Path, the popular social network that competes with the likes of Instagram, may be uploading your iPhone’s entire address book up to its servers. Arun …
A group of hackers demanded that Symantec pay $50,000 to prevent it from releasing stolen source code for several of the firm’s software titles. Symantec …
Google announced on Thursday that the company has begun to take a more active approach to keeping malware out of the Android Market. The search …
HTC has acknowledged that some the company’s handsets contain a security hole involving the handling of certain data requests while connected to a Wi-Fi network. …
Research In Motion’s latest BlackBerry 7 devices has=ve been granted Federal Information Processing Standard (FIPS) 140-2 certification by the National Institute of Standards and Technology …
Twitter finally appears to be preparing a new wave of attacks on the malicious spammers that have overrun the popular social network during the past year. Web …
Over the past week, notorious hacker group Anonymous has launched numerous DDoS attacks that disrupted service to a number of popular websites. The global hacker …
Zappos on Sunday confirmed that hackers breached the company’s servers and accessed personal data belonging to many of its customers. The Amazon-owned shoe retailer known …