STORY
Report: Chinese Hackers Breached Hundreds of Networks Globally

Last updated 15 months ago

STORY
China Proposes New File Sharing Rules

Last updated 15 months ago

STORY
Report: UN Official, Others in Armenia Hacked by Pegasus Spyware

Last updated 15 months ago

STORY
Mexico: Federal Commission to Investigate Military Amid Espionage Claims

Last updated 15 months ago


NSO iPhone malware builds a computer inside your phone to steal data
New Scientist #2 - 10 months ago

Samsung SDS to join NIST’s post-quantum cryptography project
Korea Herald - 2 months ago

How to Run Your Own Secure, Portable PC From a USB Stick
Wired #2 - 4 weeks ago

North Korean hackers blamed for hijacking popular Axios open-source project to spread malware
TechCrunch #3 - 2 weeks ago

The Sunburst hack was massive and devastating – 5 observations from a cybersecurity expert
The Conversation #1 - 7 months ago

UK companies could face fines for failing to patch Log4j vulnerability
New Scientist #3 - 3 weeks ago

The SolarWinds Body Count Now Includes NASA and the FAA
Wired #1 - 5 months ago

Hackers are hijacking WordPress sites to push Windows and Mac malware
TechCrunch #1 - 2 months ago

The Sunburst Hack Was Massive and Devastating
Snopes #1 - 7 months ago

SolarWinds told Congress that an intern was responsible for the 'solarwinds123' password security breach, but experts and documents suggest a bigger issue
Business Insider #1 - 3 years ago

11 Security Settings You Should Know About in Windows 11
Wired #1 - 2 weeks ago

New Year’s cybersecurity resolutions that every startup should keep
TechCrunch #1 - 6 weeks ago

A Former Hacker’s Guide to Boosting Your Online Security
ProPublica #1 - 14 months ago

Researchers warned for years that Facebook's phone number lookup tools were ripe for abuse. Then 500 million users' data was stolen.
Business Insider #1 - 3 years ago

The SolarWinds Investigation Ramps Up
Wired #1 - 6 months ago

Apple releases security fix for older iPhones and iPads to protect against DarkSword attacks
TechCrunch #4 - 2 weeks ago

How Apple and Microsoft’s trusted brands are being used to scam you online
CNBC #1 - 3 months ago

AI Scams, Spam, Hacking, Are Ruining the Internet
Business Insider #2 - 16 months ago

A Hacker Stole $610M of Cryptocurrency—and Returned Most of It
Wired #1 - 4 weeks ago

US cargo tech company publicly exposed its shipping systems and customer data to the web
TechCrunch #2 - 4 weeks ago

The U.S. Spent $2.2 Million on a Cybersecurity System That Wasn’t Implemented — and Might Have Stopped a Major Hack
ProPublica #1 - 9 months ago

The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?
The Conversation #2 - 3 months ago

The WIRED Guide to Data Breaches
Wired #1 - 4 years ago

How a mistakenly published password exposed Mercedes-Benz source code
TechCrunch #2 - 5 months ago

Don't Feel Guilty About Your Online Security Habits
Scientific American #2 - 10 months ago

Cybersecurity researchers spotlight a new ransomware threat – be careful where you upload files
The Conversation #3 - 2 months ago

The Secret Service Is Investigating 700 Cases of Covid Relief Fraud
Wired #1 - 8 months ago

India warns of malware attacks targeting its Android users
TechCrunch #1 - 8 months ago

What’s the new 'Background Security' on the iPhone? What we know.
USA Today #7 - 3 weeks ago

Celebrating Ten Years of Encrypting the Web with Let’s Encrypt
Electronic Frontier Foundation #1 - 1 day ago

California Man Stole 620,000 iCloud Photos in Search of Nudes
Wired #1 - 6 weeks ago

Children’s tablet has malware and exposes kids’ data, researcher finds
TechCrunch #1 - 7 months ago

Shape-shifting computer chip thwarts an army of hackers
The Conversation #3 - 2 months ago

Microsoft Probing Whether Leak Played Role in Suspected Chinese Hack
Wall Street Journal #1 - 4 months ago

How the FBI Finally Got Into the San Bernardino Shooter’s iPhone
Wired #1 - 3 months ago

A suite of government hacking tools targeting iPhones is now being used by cybercriminals
TechCrunch #3 - 5 weeks ago
More Computer security News


Political Stance
Split
Left
Right
Establishment Stance
Split
Critical
Pro
Writing Style
Provocative
Nuanced
Depth
Breezy
Detailed
Shelf-Life
Short
Long
Recency
Evergreen
Latest