News

Find out what hackers, malware, and data breaches actually mean — and how you can protect yourself.
Types of hackers Phreakers: Perhaps the oldest type of computer hackers, Phreakers discover how telephone systems work and use their knowledge to make free phone calls.
McKenzie Wark, author of A Hacker Manifesto, reveals why hacking has always been more than code—and why, in a sense, we are ...
If a hacker uses a network scanner such as Nmap, they can not only find your IP address but can also learn a wealth of information about your computer.
Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.
Spend five minutes with anyone who studies “hackers” and you will quickly learn that the term is used to define a wide array of discrete subcultures, from homebrew computer programmers all the way ...
The two self-described hacktivists said they had access to the North Korean spy’s computer for around four months before ...
In an online world infested with hackers, we need more hackers—ethical ones, that is.
This week, Google announced the discovery of three design flaws in processors of computers, tablets and smartphones that could let hackers access data. Dmitri Alperovitch, co-founder of ...