The zero-day vulnerability allows an attacker to execute code on your Windows based machine giving them the ability to install malware or...
Two hackers, with criminal pasts, are offering up a large botnet of 400,000 Internet of Things (IoT) infected devices for rent.
The DroneGun is already being called out as a fake on the internet, though the company behind it (Droneshield) looks real enough.
There are new warnings out today concerning opening files received through social media, namely Facebook and LinkedIn.
The data of over 134,000 current and former sailors data has been compromised in this latest hack.
Ring is running a Black Friday special that will knock $50USD off your purchase.
Extra precautions should be taken when making a purchase online from your computer, smartphone, or tablet.
Kryptowire is unsure how many devices are affected and there is no list but it seems it may only be budget Android...
Google's Pixel smartphone was hacked in 60 seconds at the recent PwnFest event in Seoul, South Korea.
Casting of votes is just getting started for the election and there will likely be more of these incidents throughout the day.
AtomBombing uses legitimate OS mechanisms and features to perform and hide malicious activity.
We all know that our cell phones can be a treasure trove of data for identity thieves or other ne’er do wells.
Hicurdismos misleads users and lures them into calling a number that can lead to a fake technical support scam.
Dyn provides DNS service, effectively an Internet address book for companies and that’s what’s being attacked said Steve Grobman, chief technology officer...
Children’s freedom to explore and develop should not be limited due to lack of awareness of privacy-protecting strategies.
The announcement is expected to be made sometime this week.
"Just like that, I now had access to data throughout the TMobile network without maintaining any sort of formal payments or contract."
Miliefsky says the federal government could and should take several steps if it’s truly concerned.
The breach, which seems to have originated from the Brazzers Forum, has affected nearly 800,000 users.
Our federal and local governments need to step it up and keep one stride ahead of these bad guys if they want...
Lookout has discovered a new vulnerability that was found starting in Linux version 3.6, which has been a part of Android since...
Guccifer 2.0 has also taken responsibility for the DNC hack from earlier this year.
A user claims to have found ten vulnerabilities in TeamSpeak 3 software but also states that they will not be releasing these...
If you're a casual user though, we highly recommend you ignore these calls if you get them.
Apple says the bug bounty payouts will range from $25,000 to $200,000.
It's normal to have human curiosity and want to know what might be on that USB key you just found randomly laying...
The trick is to then recode the magnetic strip on the new card to tell a credit card terminal there is no...
Password management is something we've harped on for quite some time, urging everybody to use strong passwords, password managers, two-factor authentication, etc.