News

Two hackers broke into the computer of a North Korean government hacker and leaked its contents, offering a rare glimpse ...
A hacker claims to have stolen information on hundreds of thousands of people - including U.S. government employees - after ...
The contract is geared toward companies that can conduct crowdsourced events and competitions for vetted security researchers, to help bolster DHS’ cyber resilience.
Diplomats in Southeast Asia were among global entities targeted by a China-linked cyber espionage group earlier this year, Google has announced, adding the group “likely aligned with the strategic ...
During the second phase of this three-phase program, vetted cybersecurity researchers and ethical hackers will participate in a live, in-person hacking event.
AI hacking era arrives as Russian spies deploy autonomous malware while cybercriminals use AI chatbots to automate unprecedented $500K extortion campaigns.
On Monday, the Department of Homeland Security announced 450 researchers working in its first-ever “Hack the DHS” bug bounty program identified at least 122 vulnerabilities, 27 of which were ...
The Department of Homeland Security (DHS) has launched a new bug bounty program dubbed "Hack DHS" that allows vetted cybersecurity researchers to find and report security vulnerabilities in ...
Good guy hackers plan to launch satellites and create a censorship-free Internet. They also want to put a man on the moon. Really.
Just days after an iPhone worm was discovered in the wild, Mac security firm Intego has discovered a hacker tool targeting the iPhone that exploits the same vulnerability.
The folks behind the upcoming Gdium netbook have launched a new program they’re calling “One Laptop Per Hacker.” The goal is to build a more robust developer community around the company’s ...
New Computer Program Prevents Crashes And Hacker Attacks Date: January 3, 2007 Source: University Of Massachusetts Amherst Summary: Today's computers have more than 2,000 times as much memory as ...