|Filed Under:||Technology / Security|
|Posts on Regator:||2523|
|Posts / Week:||6.3|
|Archived Since:||February 3, 2010|
European officials are pushing for more streamlined access to data stored overseas, amid an ongoing terror threat across the 28 member-state bloc.
The novel (but not new) approach to directing malware to its command server uses benign-looking comments posted on a specific Instagram post
A brazen hack which exploded into an international firestorm could have been the work of nothing more than script kiddies.
Intelligence agency heads are pushing Congress to renew the controversial surveillance law for the first time since the Edward Snowden disclosures in 2013.
Speaking for the first time tomorrow since President Trump fired him, the meeting will likely be a fascinating watch.
The director of national intelligence said that redirecting government resources would be "unjustified."
Two breaches in as many years. Is the trust gone? Alvaro Hoyos, the company's chief information security officer, answered key questions.
New vulnerabilities are being published to the underbelly of the web days before public release.
Investors were hoodwinked into paying out around $20 million to a scam artist.
Members of the Hooligans Motorcycle Club allegedly used stolen dealer credentials to duplicate keys.
A total of 200 master keys can now be used by victims to decrypt and unlock their systems.
40 years after the premiere of Star Wars, we're much closer to HAL and The Terminator than we are Artoo and Threepio.
Here's everything you need to know about the secretive FBI's investigative powers.
The "black box" attacks compromise ATMs to dispense cash.
The controversial "schedule 7" law can compel a person at the UK border to turn over device passwords.
Thanks to the FCC chairman, internet providers can now sell Americans' browsing histories for targeted advertising. We thought it was only fair to see his — so, we filed a Freedom of Information request.
A security researcher says an audio driver is recording every keystroke entered, accessible to any person or malware that knows where to look.
Comey was investigating Trump's team and possible links to Russia.
Seven of the security flaws are critical issues.
Remember this for next time lawmakers bring out the pitchforks.