Are PFC Bradley Manning's dumping of US State Department cables to WikiLeaks and Edward Snowden's theft of documents from Booz Allen, where he worked ...
Even if our phone is turned off, a hacker or intruder may have the means to turn the phone back on without letting you know. You won't see the screen light up or any other activity on the phone. But ON it is.
A report released this week by McAfee Labs revealed that a common hacker group is responsible for years of cyber attacks and espionage against South Korea.
With the increasing use of employee-owned devices, IT departments face more serious security concerns and need to strengthen the company's BYOD polici...
Is Edward Snowden really stuck in transit at the Moscow airport? The Obama administration is desperately trying to track down Snowden. Can you blame...
The best way to stay safe is to aggressively protect yourself. No one else can guard your email better than you. Here are the top 11 things you can do right now to reduce your risk of getting your email either hacked or scammed.
It's pretty safe to say Bitcoin is still in the early adopter phase of its life. The good news is that there's still plenty of room to grow.
Ultimately, who we imagine as "civic hackers" is important, because it determines what problems we see around us and what solutions we create to address them.
At the VigiTrust "How to Prevent Data Loss and Breaches in the Healthcare Industry" forum, held at the Irish Consulate in New York City, the conferenc...
The case of Jeremy Hammond is illustrative of a trend to target, overcharge and come down hard on those the state perceives as threatening. The supposed threats are due to their beliefs and/or actions toward information freedom and transparency.
What can FinFisher and other tools do? On mobile platforms they can record voice calls, SMS messages and emails. The software can place "silent calls" -- that is, turning your phone on when you are unaware it is active.
The market risks associated with real-time reporting became a reality last month, as a Twitter hoax claiming that an explosion occurred at the White House injuring President Obama led to a 150-point drop, a $136 billion market value, in the Dow Jones industrial average.
Once again we come back to the very real threat this kind of malware presents to the small- to medium-sized business who will very commonly use these kinds of free and open source tools to build up and maintain their online presence.
It's fairly safe to assume that calendars, call logs, contacts, emails, financial data, text messages, photos and videos stored on smartphones or mobile devices are at risk of being monitored or stolen.
In 2009, my friend Mike was getting into bitcoin and I remember him explaining the whole concept to me: A virtual currency managed by a peer-to-peer network open to anyone with a computer and uncontrolled by any bank or government.