Something is up… on at least three difference occasions in September, the emergency alert system in New York had unfortunate "accidents" that look remarkably similar to hacking. The first time, a "truncated" message almost caused the whole
President Barack Obama's chief counterterrorism adviser Lisa Monaco said recently that it would be very hard for someone to hack into America's voting systems in a way that could alter an election outcome.
In the six weeks since federal agents raided a suburban Maryland home and arrested Harold T. Martin III on suspicion of stealing classified information from the National Security Agency, another organization has quietly prepared to face the fallout:
In the six weeks since federal agents raided a suburban Maryland home and arrested Harold T. Martin III on suspicion of stealing classified information from the National Security Agency, another organization has quietly prepared to face the fallout:
• motherboard.vice.com by Lorenzo Franceschi-Bicchie
Last year, the US government asked Yahoo to scan all its customers emails to look for the digital "signature" of certain method of communication used by a terrorist group.
Guccifer 2.0 posted leaks he claim came from the Clinton Foundation's servers, though some have called this into question. Documents posted by the hacker suggest that Democratic Congressmen were essentially bribed in 2008 for supporting the bank bail
There's no good reason to have a Yahoo account these days. But after Tuesday's bombshell report by Reuters, indicating the enormous, faltering web company designed a bespoke email-wiretap service for the U.S. government, we now know that a Yahoo
While the hack of the Clinton Foundation was foreshadowed two months ago, moments ago notorious hacker Gufficer 2.0, who previously was responsible for hacking the DNC and DNCC not to mention the resignation of Debbie Wasserman Shultz, announced that
Hacking any system as complex as a car requires digging up not just one vulnerability but a series of exploitable bugs that create a path through the target's maze of defenses. So when researchers at the Chinese firm Tencent revealed they could bur
Yahoo Inc was sued on Friday by a user who accused it of gross negligence over a massive 2014 hacking in which information was stolen from at least 500 million accounts.
Earlier today we reported that based on a ReCode announcement, some 200 million Yahoo user accounts (yes, apparently Yahoo has that many users) may have been hacked.
Foreign hackers, suspected to be agents of a hostile foreign government, have stolen sensitive information from at least 500 million Yahoo accounts, the company announced Thursday.
For the third time, a federal judge has ruled that a mass hack by the FBI -- which ensnared thousands of computers based on only one warrant -- was illegal.
Hysteria over the government's tendency to eavesdrop on peoples' conversations and personal lives has been at an all-time high since Edward Snowden blew the whistle on the National Security Agency's activities in 2013. One person you might not
Two separate teams of scientists funded by the Pentagon's research arm have revealed significant breakthroughs in the field of quantum teleportation which could have a major impact on cybersecurity and encryption.
Finding proof that an electronic miscount or a hacker had determined the results of a Wisconsin election would be a big, big scandal. But here's an even bigger scandal: No one has any proof election results haven't been miscounted or hacked.
We've made a huge change here at WIRED. We're now encrypting everything that moves between our servers and your browser. Stories. Videos. Ads. Everything. That means no one can tinker with our content before it reaches you.
Private correspondence of Colin Powell, former Secretary of State and a retired four-star general who served under three Republican presidents has been leaked on Tuesday. The e-mails came through the hacker group DC Leaks who dumped a new trove of do
Michael Anti (aka Jing Zhao) has been blogging from China for 12 years. Despite the control the central government has over the Internet -- "All the servers are in Beijing" -- he says that hundreds of millions of microbloggers are in fact creating
Just like any regular tech company, vendors such as Hacking Team or NSO Group, which sell software designed to spy on computers and cellphones, have to convince potential customers that their product is worth the thousands of dollars, or sometimes mi