10 Ways to Hack-Proof Your Smartphone

Hacking is no longer restricted to computers, but has moved to smartphones. Besides getting access to your private information and location, a hacker can also easily get access to your email, social media and bank accounts on your smartphone. Further, the privacy concern raised by the state sponsored spies in mainstream phones has made it more difficult for the users to keep themselves secure. A classic example of this was the government hack of an iPhone used by a San Bernardino killer.
While most people aren’t targets of the FBI, NSA or a foreign government, hackers are always on the hunt to steal financial and personal information of the common man. For instance, your email account on the smartphone, paves way for the hacker to reset your banking and other sensitive passwords.Continue Reading…

Why I Always Tug on the ATM

Once you understand how easy and common it is for thieves to attach “skimming” devices to ATMs and other machines that accept debit and credit cards, it’s difficult not to closely inspect and even tug on the machines before using them. Several readers who are in the habit of doing just that recently shared images of skimmers they discovered after gently pulling on various parts of a cash machine they were about to use.Continue Reading…

13 Year-Old Has Found Bugs in Microsoft and Google

He is like every other 13-year-old teenager. However, what makes him stand out among others is his “ethical hacking” techniques that has even surprised the superpower countries like the U.S. Meet Ahsan Tahir from Karachi, Pakistan, who uses his hacking skills to help some of the biggest technology companies discover and fix vulnerabilities in their websites. In return, he gets rewarded for his hacking skills in the form of cash and swag through bug bounty programs. Tahir has already made a name for himself in the cybersecurity world by discovering bugs for biggies like Microsoft and Google.Continue Reading…

35 Million Stolen from Ohioans, Thousands Affected

One errant button click. That’s all it takes for a computer or mobile device to be infected or hacked. Just by getting people to click on malicious e-mail attachments, an international crime ring set in motion a scheme that infected more than 60,000 individual computers, sent out 11 million malicious emails and defrauded people of up to $35 million, according to federal authorities and security experts.

Continue Reading…

Page 5 of 49« First...34567...102030...Last »