Microsoft announced an additional level of protection for Windows Defender. They describe it as Advanced Threat Protection. They start by saying this: We...
For once, we’re not here to tell you about a company getting hacked, cracked, or otherwise broken-into via nefarious computer means. Although...
Check Point, a company focused on IT security, has uncovered an eBay vulnerability that allows attackers to bypass the online auction and...
US District Judge Richard Jones has ruled that Tor users lack a reasonable expectation of privacy and also revealed the government paid...
New information in the Apple VS. FBI case is emerging showing that Apple was contacted just three days after the shooting and complied...
Google seems to go for diversity and serendipity when it comes to things it works on. I say serendipity because they sometimes...
The FTC has said that ASUS has demonstrated a “failure to employ reasonable security practices [that] has subjected consumers to substantial injury.”...
A new Georgia Tech study has found that in app ads are leaking users personal data to the developers of the mobile...
Researchers at Bastille Networks have revealed what they’re calling mousejack attacks in certain USB dongles manufactured by Dell, Lenovo, Logitech and four...
The battle between the FBI and Apple over unlocking an iPhone 5c is still raging on and Apple is standing its ground...
Privoro Privacy Guard is a new device that is promising to secure your iPhone 6/6s and maintain your digital privacy. With the...
The founder of the Linux Mint project, Clement Lefebvre announced on the official blog that the Linux Mint website was hacked and...
HSBC is launching voice recognition and touch security services in the UK in a big leap towards the introduction of biometric banking. The...
Wait, what? I know, you may be rubbing your eyes and thinking that you’ve perhaps entered Crazytown, but here we are. In...
The iPhone 5c that was used in the San Bernardino shootings has become the hot topic of the week even making it...
You know a tech topic is of major importance when an afternoon has-been Chicago radio talk show host is talking about it....
Have you ever wanted to get even with those advertisers who spam mobile ads through the apps on your phone? I know...
All mobile applications require some sort of permissions in order for the software to operate as intended that’s entirely normal protocol. Developers...
Ransomware on your personal computer can be a huge pain in the butt to deal with, often times the only solution is...
Security service Symantec is reporting a rise in Netflix accounts being hacked and passwords being sold for as little as 25¢. Symantec...
Government Needs To Be More Vigilant Against Enemies Overseas, Cyber Security Expert Says The Internet has transformed the way we communicate, the...
It seems that every day huge companies are getting hacked, client data is getting stolen, and user accounts are getting compromised by...
Well if you can’t break into Apple’s systems through traditional hacking methods why not pay €20,000 for an employee’s Apple logins? According...
Would you like your data breach Biggie Sized? I can’t take credit for that amazingly sick burn, it was shamelessly stolen from...
Have you ever lost your password or forgotten your login details for a service? Usually it’s just a matter of contacting customer...
Jokes are fun, right? Well, they’re fun right up until they aren’t. I’d imagine this joke falls into the latter category of...
Amazon has built a reputation on the Internet as being a great place to purchase goods and services online. They offer a...
Before we actually talk about this survey conducted by brand marketing company Prophet, we have to stress that surveys can swing either...