Kaiten, an Internet Relay Chat (IRC)-controlled malware typically used to carry out distributed denial-of-service (DDoS) attacks, has returned, in a stronger configuration. It’s targeting routers and internet of things (IoT) devices. ESET researchers have identified three tougher versions of the

A 16-year-old hacker exploited vulnerability in Steam and went on to publish his 45-second-long ‘game’ onto Steam without a single person at Valve setting eyes on it. Ruby Nealon, who created the game called Watch Paint Dry, is a game about

The FBI is resisting calls to reveal how it identified people who used a child pornography site on the Tor anonymising network. The agency was ordered to share details by a Judge presiding over a case involving one alleged user

The “Father of Car Hacking” was just announced the winner of the 2015 ACM-Infosys Foundation Award, but the first step on the path that lead here started several years ago. University of California – San Diego (UCSD) professor Stefan Savage

“Google dorking.” It sounds goofy, but it could be just the ticket for a hacker looking to stir mayhem. The search technique is one of several methods that bad guys can use to find vulnerable computer systems and trace them

According to The Register, a UK-based news site about tech security and related issues, “hackers infiltrated a water utility’s control system and changed the levels of chemicals being used to treat tap water.” The hackers had “ties to Syria,” and

The hacking collective Anonymous says it has shut down more than 20 Angolan government websites in response to the jailing of 17 youth activists. Many of the sites were still down 20 hours after the Portuguese branch of the group

No need for stocking masks and sawn-off shotguns. The unprecedented heist of $81 million from the U.S. account of Bangladesh’s central bank is the latest among increasingly large thefts by criminals who have leveraged the speed and anonymity of hacking