How hackers can use your fingerprints to frame you – #WTFWednesday
It’s the one thing that was supposed to be truly personal to you. As unique as the special snowflake...
Let’s make a deal: Russian hackers willing to compromise
Is this the new face of malware? According to a recent Geek article, instead of hiding behind a randomly-generated...
Security spend: Is the NSA out for Bitcoin?
Crypto-currency Bitcoin doesn't have it easy. While in theory the virtual money system should be secure, efficient, and offer...
WikiLeaks creates searchable archive of hacked Sony emails and documents
Thousands of documents and emails snaffled during an attack against Sony Pictures last year have been published on WikiLeaks,...
FBI’s plan to expand hacking power advances despite privacy fears
The Judicial Conference Advisory Committee sanctioned a new rule that would expand the FBI's hacking authority.
SIM-ply irresistible: NSA and GCHQ accused of massive mobile hack
How secure is your phone? Most users are now mindful of risks like insecure networks, malicious apps and fraudulent...
Solve for “X”: Equation Group hackers leave more questions than answers
Stuxnet and Flame are two of the most well-known malware operations in the world, but according to a new...
Withdrawal pains: Banks lose $1 billion in new hack
How do you get money out of the bank? If you're like most people, you head to the nearest...
Hacktivism and vandalism were the main motivations for DDoS attacks last...
Distributed denial of service (DDoS) attacks are growing in size, frequency and complexity, according to the latest Annual Infrastructure...
NSA tapping into North Korea
Do you remember the recent hack of Sony Pictures Entertainment? If so, you’ll likely also recall that speculation as...