
In Pictures: 15 of the scariest things hacked
From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
Unlike consumer electronics, cars can stay in use for decades, long after operating systems and component software cease being supported through updates that patch vulnerabilities - a challenge the industry is still grappling with.
Bulgaria's finance minister apologized to the country on Tuesday after admitting hackers had stolen millions of taxpayers' financial data in an attack that one researcher said may have compromised nearly every adult's personal records.
When you forget your Gmail password, and have two factor authentication (2FA) enabled, Google will SMS or call you with a six to eight digit code. You enter the code (Google calls this 2-step verification) and gain access to your account.
Intrusion activity attributed to the same group which attacked the industrial safety systems of a petrochemical plant in Saudi Arabia in 2017 has been uncovered at a second facility, security researchers have confirmed.
For the first time, the Australian Signals Directorate has revealed details of its “offensive cyber” operations.
Here’s how to find out if your child is involved in malicious online activity -- before the authorities do
Netflix is securing the borders of its US library, but the latest crackdown is another token effort in a war it can never win.
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet
Last week Gen. David Petraeus, the director of the Central Intelligence Agency, resigned in response to what has turned out to be a much bigger scandal than it first appeared.
2011 so far has been filled with news of high-profile hacking - the Epsilon data breach, Microsoft and the various attempts of the nefarious Anonymous. Even the Australian Government copped a little unwanted interest. With this in mind, we thought it was time to track down the top ten Hollywood movies about hacking.
With technology supply chains rapidly evolving to all corners of the globe, doors continually open for unsavoury elements to find new ways to take advantage. Whether for personal gain, monetary gain, criminal activity, espionage, or military threat, black hats keep unearthing opportunities to exploit supply chain vulnerabilities.