WASHINGTON (AP) -- Hillary Rodham Clinton's private email server, containing an electronic inventory of some 55,000 pages of emails from her stint as secretary of state, was repeatedly hit by attempted cyberattacks originating in China, South Korea a
Eight months after disclosing a major data breach, ride service Uber [UBER.UL] is focusing its legal efforts on learning more about an internet address that it has persuaded a court could lead to identifying the hacker.
Verizon, fresh off its acquisition of AOL, is using a controversial technology to combine the power of three major advertising networks using three different types of data mining to follow you around the internet more closely.
Microsoft has recently released updates to Windows 7 that allow it to gather more information about our PCs. But is the company really tracking what we do on our systems? And can this data gathering be turned off?
The news from the Office of Personnel Management hack keeps getting worse. In addition to the personal records of over 20 million US government employees, we've now learned that the hackers stole fingerprint files for 5.6 million of them.
When 9.7 gigabytes of Ashley Madison user data was leaked across the web last month, the immediate question for affected users boiled down to how they would explain themselves to their significant others.
As long as hackers have sold their secret hacking techniques known as zero-day exploits to government spies, they've generally kept that trade in the shadows.
For governments seeking to hide controversial programs from their citizens, there are few better directions to transmit secret military and espionage communications than straight up.
The intelligence community's top lawyer, Robert S. Litt, told colleagues in an August email obtained by the Washington Post that Congressional support for anti-encryption legislation "could turn in the event of a terrorist attack or criminal even
The Department of Justice plans to embed a prosecutor within the European Cybercrime Centre (EC3) to better combat hackers, who often strike the U.S. from across the Atlantic.
IF YOU PROTECT your Android phone with a password rather than an unlock pattern or PIN, you may want to keep it in your sight a little more carefully than usual.
FBI Director James Comey said on Thursday that criminals who think they can evade law enforcement using the "dark web" and the Tor Network, which is designed to conceal the Internet addresses of the computers being used, are "kidding themselves
• yahoo.com, By Hui Min Neo and Romain Fonsegrives
Berlin (AFP) - Punching in security codes to deactivate the alarm at his store became a thing of the past for Jowan Oesterlund when he implanted a chip into his hand about 18 months ago.
Last week, 21WIRE reported on the eminent demise of the controversial adult dating website, Ashley Madison, which was the center of an alleged "hack" which is said to have exposed its 37 million adulterous members.
The Ashley Madison hack is bad news for, well, just about everyone. With some 32 million users reportedly exposed, the hack of "the most famous name in infidelity" is bad for the company, bad for its users, and undeniably awful for their spouses.
At least three people have reportedly committed suicide now after being outed as cheaters from the Ashley Madison extramarital affair website hack and subsequent leak of some 37 million email addresses worldwide.
Ashley Madison's parent company Avid Life Media is offering a $500,000 reward for information leading to the arrest of the hacker or hackers behind the breach of its network.
For a site that touted itself as the premier cheating site for married people seeking partners for infidelity, Ashley Madison was relatively unknown until hackers broke into its servers and released more than 30 gigabytes of customer and company data