Medicine & TechnologyA hacker got into NASA's James Webb Space Telescope data and used one photo to install malware on Windows machines. Read on to know the full story.
Cynerio, a cybersecurity startup detected 5 vulnerabilities in autonomous robots purposely designed for medical use. Learn more about the vulnerabilities here.
A flaw in Bluetooth devices has left billions of devices, mostly Android smartphones, vulnerable to hackers and attackers that can access them without the proper authorization, researchers discovered.
Hackers are growing even more bold extending their ransomware attacks beyond businesses and even targeting police departments. Police departments across the United States have fallen victim to ransomware attacks that encrypt documents and demand payment in order to release their lockout.
Hackers are growing even more bold extending their ransomware attacks beyond businesses and even targeting police departments. Police departments across the United States have fallen victim to ransomware attacks that encrypt documents and demand payment in order to release their lockout.
When it comes to digital censorship, China does it best. In fact, as enemies of the freedom of speech movement on the internet, one nation has devised ingenious ways for covering their tracks and making sure that the Chinese public does not see websites or an unadulterated view outside of the “Great Firewall”. But in a new study published this week by the University of Toronto and the University of California, Berkeley, researchers are saying that China’s recent attacks on the internet instead used a new weapon—and it’s one with far more nefarious applications.
Slack Technologies is the latest company to fall victim to hackers, exposing the private information of up to 500,000 users, such as email addresses, telephone numbers, Skype IDs and any other information that its users might have entered.
Technology companies such as Google and Apple are scrambling to create a patch that will fix a major security flaw that for more than a decade has left their devices vulnerable to hacking when they visited websites that were considered secure.
Finding a hacker might not be too difficult these days. A new website called "Hackers List" is up and running, and is now trying to connect hackers with people who either need access to personal information, access to a database, or just want to mess with someone they don't like.