Hacking

In this section we cover hacking, threats, and related security issues. Also see enterprise security and viruses.




Social engineering might be low tech, but it works. That means that protecting against it isn't so much about technology as it is about...


As technology continues to play an ever larger role in our lives, these threats can leave users feeling exposed.


On Facebook, not everything is as it seems. No matter how many friends you have, enemies may be lurking there as well.


Cell phone hacking has become a real concern with the widespread use of smartphones. Learn about how hackers get into your phone and what...


Hackers have a bad reputation, but these tech renegades actually do serve a purpose.


With a staggering 65,535 TCP ports being made available on a single IP address it's easy to see why there are so many security exploits on...


Spear phishers are baiting their hooks for 'big phish' with access to highly valuable corporate information, a strategy known as whaling.


When BGP was developed, network security wasn't an issue. That's why the problem with BGP is also its greatest advantage: its simplicity.


Each and every year, new attacks leave behind a new normal in cybersecurity. So what will that look like in 2017? We asked experts to give...


The battlefield no longer has to be a physical space - war is now taking place in cyberspace. White hat and grey hat hackers combat...


As human activity in the physical space evolves and merges into the virtual, ethereal realm of networked media, significant changes are...


Ransomware can cripple a business, but what can you do about it? Security experts weigh in on options.


Some new technology isn't living up to expectations, while some is making a comeback. We also look at the newest in navigation and hiring...


Data breaches can happen to any business, not just the huge nationwide chains you hear about on the news. Small- to medium-sized businesses...


Malware doesn't just affect computers anymore - it's becoming an ever-increasing threat to Android devices as well. Learn about Android...


Android marketplaces are not vetting applications sufficiently. A North Carolina State University research team has a solution that will...


CryptoLocker began crippling computers in late 2013. Now the new and improved PowerLocker has been discovered, and is even more dangerous...


As cyber threats continue to evolve, old security solutions just don't cut it. Here are a few technologies that have been rendered minor...


This Trojan Horse keystroke logger is believed to be a special FBI surveillance program that can be installed remotely via an email...