Computers owned by the SEC Trading and Markets division were brought by SEC staffers to a hacker convention. They contained unencrypted, step-by-step instructions to shut down our financial trading system. Essentially: A Hacker's Guide to our Financial Universe.
In 2010, computer scientists from the University of Michigan and Princeton hacked a touch-screen voting machine, installing the video game Pac-Man. Could comparable voting systems in Ohio be subverted to alter the presidential vote tally?
It may sound like a scene from a zombie apocalypse movie, but it could be your life -- a nationwide cyber-version of Ground Zero. Think of it as 9/11/2015.
The story of Anonymous hasn't been told because it's probably just begun. But the documentary We Are Legion: The Story of the Hacktivists is a really good beginning to that story.
How will you know when the "cyber Pearl Harbor" has occurred? When the lights and heat in your home go off. When you can't make a phone call. When no ATM works. When your flight cannot land.
We hear a lot of genuine concern about the growing number and sophistication of hacker attacks. But based on the information contained in this report, the sad truth is that our own government's security policies -- or lack thereof -- have put us all at risk.
As the Internet becomes a more lucrative ground for corporate interests, the likelihood of censorship of inflammatory content increases. Which is why some techies are trying to scrap the Internet we have and build a new one.
If a disruption of service for less than eight hours will make this big of a splash on the internet, as is the intent of recent cybersecurity legislation, imagine what a complete shutdown of the internet will do.
The adult film industry is cracking down and shaming people into paying fines who upload and download porn. To get the links to the stories, go to ...
By David J. Hill Contributing Writer, Singularity University. If you use the web for more than just browsing (that's pretty much everyone), chances...
Whenever a celebrity scandal breaks, like Kristen Stewart's cheating on boyfriend Robert Pattinson, entertainment journalists aren't the only ones scrambling to get the story online -- so are hackers.
For years security experts have lectured us about the need to move on from this culture of passwords, but the cries have always been ignored -- perhaps until now.
The "Party of No" hurt us all on a critically necessary piece of cyber-security legislation, and continued the U.S. Senate's proud tradition of failing to do anything to deal with our absolute vulnerability to an attack by state sponsored hackers and terrorists on our critical infrastructure.
Three out of five U.S. adults online fear being hacked, but 69% of these same people engage in super-risky behaviors like using the same password everywhere. Why?
In Las Vegas this weekend, a different kind of Olympics is unfolding, with athletes testing their skills, determination and courage in digital contests at DEFCON, one of the oldest and most important hacker conventions in the world.
While frequent data breaches may have desensitized some consumers to identity theft, it's still important to pay attention to early warning signs your info is being used illegally, no matter how creative, silly or transparent a scam may seem.