iOS app Android app

Hacking

SXSW Post-Script: Technology and Warm-Blooded Humanity, Integrated

David Tereshchuk | Posted 03.24.2017 | Media
David Tereshchuk

The South By South West Festival of 2016 finally finished this week. In the end it seemed, more sprawlingly than ever, to take over the city of Austin...

What Apple vs. FBI Means for VR

Steven Schkolne | Posted 03.24.2017 | Technology
Steven Schkolne

It's the year 2025 - we're all walking around with technogoggles on our heads, living in a mixture of virtual reality and real reality. Welcome to the...

You Should Be Worried If The FBI Can Hack iPhones Without Apple

The Huffington Post | Casey Williams | Posted 03.22.2016 | Technology

The Justice Department said Monday that it might not need Apple's help unlocking an iPhone connected to the San Bernardino terror attack. An outside ...

Google: $100,000 Says You Can’t Hack A Chromebook Remotely

The Huffington Post | Nina Golgowski | Posted 03.18.2016 | Technology

Google is hoping to bait the world's top hackers with a $100,000 reward for hacking one of the company's Chromebooks remotely. The technology giant an...

Your Sex Toys Could Be Vulnerable To Cyberattack

Reuters | Casey Williams | Posted 03.15.2016 | Technology

HANOVER, Germany (Reuters) - It's not just computers and mobile phones that are vulnerable to cyber attack, according to software firm Trend Micro. As...

Online Users Are Not Protecting Their Own Security

Eli Schwartz | Posted 03.11.2017 | Technology
Eli Schwartz

Every few months it seems that there's a large scale cyber hack that makes the headlines and sends people into a panic about their online security. As...

The Cyber Security Conundrum

Alan W. Silberberg | Posted 03.09.2017 | Technology
Alan W. Silberberg

co·nun·drum kəˈnəndrəm/ noun noun: conundrum; plural noun: conundrums a confusing and difficult problem or question. "one of the most d...

The Pentagon Wants You To Hack Them

Michael Lazar | Posted 03.08.2017 | Fifty
Michael Lazar

The U.S. Department of Defense wants to get hacked. For real and not for real, so they explain. It's part of the department's progressive efforts to h...

UC Berkeley Alerts 80,000 People To Cyber Attack

Reuters | Lee Moran | Posted 02.27.2016 | Technology

SAN FRANCISCO (Reuters) - Officials at the University of California Berkeley said on Friday that they were alerting 80,000 people, including current a...

Recent Online Dating Company IPO Raises Questions About Privacy

Paul Alexander | Posted 02.24.2017 | Business
Paul Alexander

No doubt there's big money in online dating, which has seen dramatic growth over the past decade as more people seek a date by going online instead of heading to a bar or a nightclub, and Match boasts some of the best-known sites in the business.

Getting to "Reasonable" With the SAFETY Act

Brian E. Finch | Posted 02.23.2017 | Business
Brian E. Finch

While an executive or board member has every right to ask about a company's cybersecurity posture, the problem is that CIOs generally do not have the ...

Why 2016 Will Be an Even Scarier Year for Internet Security

Rami Essaid | Posted 01.26.2017 | Technology
Rami Essaid

The holiday decorations had barely been returned to the attic when 2016 already saw its first high-profile cyber attack. Time Warner Cable said on Jan...

Behold The Self-Pushing Stroller. What Could Go Wrong?

The Huffington Post | Casey Williams | Posted 01.23.2016 | Technology

If hackers can take control of a baby monitor, what could they do with an Internet-connected stroller that wheels itself around? The Smartbe stroller,...

Will Someone Else Be Cashing Your Tax Refund This Year?

Adam Levin | Posted 01.14.2017 | Crime
Adam Levin

With more than a billion personal records "out there," identity theft has become the third certainty in life, right behind death and the topic at hand.

How Finding a Fun Little Bug Can Avert Disaster

Aran Khanna | Posted 01.12.2017 | Technology
Aran Khanna

This story is just a real world reminder of how, thanks to the huge benefits of reusing code, almost none of the software we use exists in a vacuum, and so a bug in a silly video game can actually lead to a serious exploit in a sensitive government system.

Your Smartwatch Can Be Hacked To Monitor And Steal Your Passwords

Fusion | Farah_Mohamed | Posted 12.19.2016 | World

Smartwatches’ abilities to pay for our food and monitor our physical activities are only possible thanks to the myriad sensors packed into their tin...

The Biggest Cyber Stories of 2015

Quora | Posted 12.29.2016 | Technology
Quora

What are the top 10 Cyber security breaches of 2015? originally appeared on Quora: The best answer to any question. Answer by Sai Ramanan, Lead Quora...

Can Smart TVs Be Hacked?

Quora | Posted 12.17.2016 | Technology
Quora

As part of my job as a security response researcher in Symantec, I recently got a chance to experiment on a new generation smart TV to see how well it was secured against attacks. I quickly realized, that after a successful attack, I was looking at an ultimately unusable brand new TV infected with ransomware.

What It's Like to Lose Your Ability to Speak

Amanda Gutterman | Posted 12.16.2016 | Impact
Amanda Gutterman

For me and my mother, watching fall slip quietly once again into winter, we're both reminded that something is missing. That something is my dad, who died around the holidays in 2007 after a long fight with ALS.

Her Facebook Account Was Hacked -- Can She Unhack It?

Christopher Elliott | Posted 12.03.2016 | Business
Christopher Elliott

Barbara Chaiken's Facebook account is hacked, and the bad guys are asking all her friends for money. Is there any way to stop this?

Chinese Government Says It's Not Behind Massive U.S. Hack

Reuters | Lorenzo Ligato | Posted 12.02.2015 | Technology

China's official Xinhua news agency said on Wednesday that an investigation into a massive U.S. computer breach last year that affected more than 22 m...

VTech Hack Leaves Millions Of Parents -- And Their Kids -- Exposed

Reuters | Lorenzo Ligato | Posted 11.30.2015 | Technology

The theft of toy maker VTech Holdings Ltd's database highlights a growing problem with basic cyber security measures at small, non-financial companies...

6 Ways You Might Get Hacked This Holiday Season

Jason Glassberg | Posted 11.10.2016 | Technology
Jason Glassberg

As someone who works in the cybersecurity industry, I know that the November to December timeframe is when many consumers and businesses will get hacked or defrauded. In many ways, the holiday season is an ideal time for cybercriminals.

Trans Hacking Startup Land: Gender Performance and Deception

Alyx Baldwin | Posted 10.26.2016 | Queer Voices
Alyx Baldwin

After I moved away from being gender ambiguous, I unbound myself and started presenting as a queer woman. I reached out to many LGBTQ* startup allegiances for help with fundraising. That was where I met more hostility than ever before.

Apple, Facebook Come Out Against Controversial Cybersecurity Bill

Reuters | Lorenzo Ligato | Posted 10.22.2015 | Technology

EmbedContent(5629039be4b0443bb562ebc6,,Embed,video,Some({"url":"http://live.huffingtonpost.com/r/archive/segment/5628fba38795a287da00018d","type":"vid...