Archive

North Korea has tried to hack into email accounts of South Korean railway workers in an attempt to attack the transport system’s control system, South Korea’s spy agency said on Tuesday. South Korea has been on heightened alert against the

Even as the fight against online terrorism is taking on Twitter and Facebook, the online hacktivist group, Anonymous has claimed that Twitter is shutting down their accounts which are finding and reporting ISIS linked accounts. Anonymous claimed that in the

According to a paper, published Friday in the journal Science, Physicists at MIT and the University of Innsbruck in Austria have created a quantum computer out of just five atoms in an ion trap that uses laser pulses to carry

Students of MIT and Britain’s University of Cambridge will spend the weekend hacking one another’s computers, with the blessing of their national leaders. The two schools are competing in a hacking contest that U.S. President Barack Obama and British Prime

RSA 2016 Dell SecureWorks duo Joe Stewart and James Bettke have created a free honeypot loaded with fake domain credentials in a bid to help admins trap and block attackers. The researchers built the Domain Controller Enticing Password Tripwire (DCEPT)

Craig Federighi, Apple’s senior vice president of software engineering (and one of its most popular WWDC presenters) says the FBI’s demands on the company will make all iOS users more vulnerable to malicious attacks in an opinion piece for the

ThreatAnalyzer 6.0 provides advanced discovery and response for malware that evades detection ThreatTrack Security has announced the release of a new version of its malware analysis sandbox,ThreatAnalyzer 6.0, which has been re-engineered to expose advanced malware that is increasingly being

Mobile security company Skycure at the RSA conference in San Francisco earlier this week revealed that a new malware puts more than half a billion Android smartphones at risk of being exposed to hackers. Considered as one of the most

Tesla Motors Inc (NASDAQ:TSLA) has been working on a new Model S P100D, a version that the EV firm is yet to announce, revealed a notorious Model S hacker – Jason Hughes. But, it appears that the EV firm is

RSA Conference – Pulse Secure, the leader in secure access solutions, recently announced new solutions to allow enterprises to embrace cloud delivered apps and data in order to increase worker productivity without sacrificing security. Pulse Secure is taking a simplified

Encryption is currently a very hot topic in the tech industry, with Apple facing a legal battle with the FBI. The company is being ordered to create a backdoor to infiltrate encryption on an iPhone used by the shooters in

When you’re considering the use of any public Wi-Fi service, two primary concerns are how secure the connection is and what limitations are imposed. In-flight Wi-Fi has the same security concerns as a typical public connection that you’ll find at

SAN FRANCISCO — Amazon Web Services, a globe-spanning cloud computing network that is part of the online retailing giant Amazon, has rapidly become one of the most powerful forces in technology. It has also become a target for poachers. Last

Donald Trump’s voicemail has allegedly been hacked by members of Anonymous, the loose group of hackers and activists. The 2012 messages appear to show leading figures in the US media showering him with praise, compliments, and thanks for his financial support. Gawker, which

BOSTON (Reuters) – Apple Inc. customers were targeted by hackers over the weekend in the first campaign against Macintosh computers using a pernicious type of software known as ransomware, researchers with Palo Alto Networks Inc. told Reuters on Sunday. Ransomware, one

Could you invent an autonomous hacking system that could find and fix vulnerabilities in computer systems before criminals could exploit them, and without any human being involved? That’s the challenge faced by seven teams competing in Darpa’s Cyber Grand Challenge