A new attack mechanism has been uncovered by Cybellum security researchers that can be used to hijack a PC by…
A while ago, F-Secure Corp.'s researchers found a flaw in QNAP's operating system that could allow a hacker to gain full…
The proliferation of consumer drones in the last decade has been a boon for remote-control flying enthusiasts and filmmakers, but…
Tesla's Model S may be one of the most technologically advanced vehicles on the road, with its large suite…
Did you think that email confirmations and generated code needed to log into unauthorized computers would stop hackers from hijacking…
I don't think it will be a shock to hear about yet another way government agencies try to spy on…
There have been a number of unusual hacking techniques employed in Brazil recently. A group of hackers have used a…
Craigslist was knocked offline yesterday (Sunday) and at the time of writing, it still hasn't come back. The suspected DNS hijack…
The Raspberry Pi has proven to be a useful tool for security researchers once again. This time, the Chromecast has…
Though authorities had taken action against the GoZeuS and CryptoLocker malware which stole hundreds of thousands of banking logins from…
Apple's Find My iPhone feature is one of the most important features of the company's security, having the ability to…
An expert in speech recognition states that Google Chrome users are exposed to various attacks and malware infections that can…