Rogue cell phone towers can track your phone and intercept your calls, and it’s only a matter of time before they’re as ubiquitous as GPS trackers. But at least now there’s a way to spot them.
Before companies like Microsoft and Apple release new software, the code is reviewed and tested to ensure it works as planned and to find any bugs. Hackers and cybercrooks do the same.
One of the hairier unintended consequences of cheap 3-D printing is that any troublemaker can duplicate a key without setting foot in a hardware store.
What are the ethics of platform design? One of the reasons that Facebook study on user emotions was so controversial is that it touched on the kinds of ethics we expect — or don’t expect — from platform designers.
Approximately 4.93 million Gmail usernames and passwords were published to a Russian Bitcoin forum on Tuesday, as first reported by Russian website CNews. That’s the bad news. The good news is that this leak doesn’t seem as massive upon further inspection.
In the mid-nineteen-seventies, when Christopher Doyon was a child in rural Maine, he spent hours chatting with strangers on CB radio. His handle was Big Red, for his hair.
A hacker broke into part of the HealthCare.gov insurance enrollment website in July and uploaded malicious software, according to federal officials. Investigators found no evidence that consumers’ personal data were taken or viewed during the breach, federal officials said.
Moscow (AFP) – Russia on Saturday sent six ships carrying personnel and equipment to a Soviet-era military base in the Arctic that it is reopening to bolster its presence in the region, Russian news agencies reported.
As U.S. banks and retailers are barreling toward a 2015 deadline to replace magnetic-stripe credit and debit cards with more secure cards that come embedded with a microchip, researchers have announced a critical flaw in the card system.
Amsterdam, February 25, 2015 – Following the release of a report by a news website on February 19, 2015, Gemalto (Euronext NL0000400653 GTO), has conducted a thorough investigation, based in particular on two elements: the purported NSA and GCHQ documents which were made public by this website,
Facebook is enforcing its “real names” policy, insidiously outing a disproportionate number of gay, trans and adult performers — placing them at risk for attacks, stalking, privacy violations and more.