"I have forgotten my password". Virtually any sign-in form in the Internet has this link. And while restoring one or two passwords...
Showing results 1 to 20 of 290
Anything that can be hacked, will be hacked — including neural networks. Here's what researchers have learned about surprising artificial intelligence behavior.
The company strongly denies the allegation, but if it is found to be true, it could cause an upheaval in the world of telecom equipment
The banking giant suffered a network breach this year that resulted in a large data breach — though, funds or critical personal information are not thought to have been stolen.
The news comes not long after leaked documents showed the NSA was bugging and spying EU offices around the world. But the U.S. agency can likely be ruled out as a suspect in this latest hack, following reports from German media.
Former NSA contractor reportedly provided documents pointing to the U.S. government hacking of major Chinese telcos, Internet submarine cable giant Pacnet, and Chinese research institute Tsinghua University.
CoolEagle is designed to protect your DSL- or cable-connected PC from hackers. This program includes four interlocking security services:...
A separate network specifically for machine-to-machine communication could reduce security risks and make it harder to hack.
User forum posts suggest that the network may have been breached -- by accident.
Revolutionary set of Network Administration tools for professionals. Scanning utilities and configuration utilities. TraceRoute tells...
At Hack In The Box researcher Felix "FX" Lindner has shown how Huawei routers are easy to access with their static passwords and how one machine could give an attacker access to an entire network.
The Power Pwn may look like a power strip, but it's actually a DARPA-funded hacking tool for launching remotely-activated Wi-Fi, Bluetooth, and Ethernet attacks. If you see one around the office, make sure to ask if it's supposed to be there.
Spike in cyberattacks not spurring similar rise in cyberinsurance adoption worldwide due to issues of cost, trust and limited regulation, which reflect a still immature market especially in Asian region, observers note.
Chinese hackers allegedly plant bug via flash drives on India navy's computers, which relayed sensitive data to China IP addresses, report notes.
Hacktivist group launched "Operation Japan", a series of cyberattacks to rebel against recent revision of copyright law, the first time Japanese government organizations have come under attack by group, report notes.
update New breed of sophisticated financial fraud campaign targets high balance accounts from financial institutions to siphon money from there to automated mule accounts, research finds. One McAfee exec says Asia was not spared either.
Founder of Chinese telecom giant, which has faced security concerns in the US and Australia, makes call for global cooperation to improve data protection, according to reports.
Cloud-based distributed denial of service protection a lucrative business opportunity, especially in Asia where awareness of DDoS attacks and risks is growing, industry exec says.
Students ought to be taught cybersecurity knowhow as soon as tech is introduced to them, and such courses should be holistic to include ethical and societal impacts, observers say.
Hackers using improved attack techniques with distributed denial-of-service, while new technologies spurred its propagation and damage level, industry watchers point out.
update Social networking site reveals some of the reported 6.4 million passwords stolen matched its users; is taking measures to protect users and make passwords more difficult to hack.
Hacker group Swagg Security reveals it broke into Chinese telco's vulnerable SQL server and published stolen administrator passwords online. It also hacked into Warner Bros' intranet.
AP Power Generation in city of Andhra Pradesh latest victim of hacktivist group's crusade against country's alleged Web monitoring activities, report states.