Cars are targets for identity theft
DETROIT — Hackers can already take control of a car. And as vehicles become rolling shopping malls, cybercriminals will have an opportunity to snatch your identity, too. Eager for a cut of drivers’...
View ArticleAmerican Drones Are Killing ISIS Hackers Now
ISIS talks a big talk when it comes to hacking, and United States forces just showed they’re not going to put up with it. The Obama administration just announced that a drone strike has killed the...
View ArticleAshley Madison hacker revealed?
TORONTO – An AC/DC reference at Toronto Police’s Ashley Madison press conference Monday helped spark an American tech journalist’s new theory about the hack. Brian Krebs, who independently covers cyber...
View ArticleAssange: What Wikileaks Teaches Us About How the U.S. Operates
In an introduction to a new book, The WikiLeaks Files: The World According to U.S. Empire (Verso, 2015), Wikileaks editor-in-chief Julian Assange explains how the leaked U.S. documents have lifted the...
View ArticleAshley Madison founder steps down
The founder and chief executive of the Ashley Madison infidelity dating website, Noel Biderman, has stepped down. A statement released by the firm said his departure was “in the best interest of the...
View ArticleHackers Stole $1.2 Billion From Businesses in New Scam
You have more than likely heard about hackers and the multiple hacks that have happened at businesses throughout the years, such as Home Depot, Target, and Ashley Madison. A new scam though is...
View ArticleHackers’ helper: A young malware creator deserves stiff punishment
Morgan C. Culbertson pleaded guilty in federal court Tuesday to designing and trying to sell Android phone hijacking malware on Darkode, an online marketplace for criminals and hackers. The Carnegie...
View ArticleIranian Military Hackers Launched Google Phishing Campaign Against US, Middle...
Iranian expatriates and American activists are being focused by an “elaborate phishing marketing campaign” that permits hackers to take management of their Google account, based on new analysis from...
View ArticleUber Is Hiring The Two Hackers That Were Able To Hack The Jeep Cherokee
The recent hack of the Jeep Cherokee was a pretty important story, and it resulted in Fiat Chrysler, the owner of Jeep, recalling a number of vehicles to undergo a software patch. This was reportedly...
View ArticleWikiLeaks founder Julian Assange fears assassination attempt
WikiLeaks founder Julian Assange fears he may be assassinated if he steps outside the Ecuadorian embassy. In an interview with The Times Magazine, Mr Assange said he has not had any fresh air or...
View Article49 78 0 Comment 12 Email U.S. Weighs Sanctions Over China For Cyber Hacking:...
WASHINGTON, Aug 30 (Reuters) – The White House is considering applying sanctions against companies and individuals in China it believes have benefited from Chinese hacking of U.S. trade secrets, the...
View ArticleRussian-speaking hackers breach 97 websites, many of them dating ones
Russian-speaking hackers have breached 97 websites, mostly dating-related, and stolen login credentials, putting hundreds of thousands of users at risk. Many of the websites are niche dating ones...
View ArticleUber Hires Hackers To Protect Self-Driving Car
Uber hired Charlie Miller and Chris Valasek, the same men who hacked into the Jeep Cherokee remote driving system two months ago, to lead the company’s efforts in protecting their vehicles against...
View ArticleHackers steal Catholic Church employee data
(NEWSCHANNEL 3) – Employees at Michigan Catholic churches are the latest victims of cyber criminals. Hackers accessed data of more than 10,000 people working for Catholic churches or church affiliates...
View ArticleWikiLeaks’ Assange stays indoors, fears CIA drone attack
WikiLeaks founder Julian Assange fears he will be sent to the United States, where he could face the death penalty, and even worries that he will be targeted by a CIA drone. Assange, who faces...
View ArticleWhat Hackers Want More Than Your Credit Card Number
Account takeover fraud — which occurs when a cybercriminal gains unauthorized access to an online account— is growing rapidly, a new analysis by a major Canadian cybersecurity company shows. Vancouver,...
View ArticleJeep Cherokee Hackers Join Uber To Make Its Autonomous Car Technology Hack-Proof
They got Chrysler’s attention when they hacked a Jeep Cherokee and they likely prompted Uber to take notice. Uber just recruited cybersecurity researchers Chris Valasek and Charlie Miller, as the...
View ArticleForeign hackers breach U.S. sites in search for intelligence operatives
WASHINGTON — Foreign spy services, especially in China and Russia, are aggressively aggregating and cross-indexing hacked U.S. computer databases — including security clearance applications, airline...
View ArticleHackers Use iOS Malware to Steal Over a Quarter of a Million Apple Accounts
In the biggest Apple accounts hacking ever, 250,000 Apple accounts were stolen with malware. What if we told you there’s a way to avoid being next? Here goes: Don’t jailbreak your phone. The iOS...
View ArticleClinton team panicked over Wikileaks
Hillary Clinton’s concern over the November 2010 release of classified records to the Wikileaks outlet was on full display in the 7,000 pages of her emails that were published by the State Department...
View Article
More Pages to Explore .....