A person who uses computers to gain unauthorized access to data.

Posts

What is Zoom? How does it work? Is it safe? There have been suggestions that competitors Microsoft and Google are safer applications.

As the internet of things (IoT) rolls out hackers have found ingenious ways of conning you out of your cash. Today we see how hackers can break into IoT kit, take control and then demand a ransom.

The stolen data included “secret plans to develop a supersonic anti-ship missile for…

SSH private keys are being targeted by hackers who have stepped up the…

Vancouver-based Etherparty on Sunday was forced to shut down its website after hackers…

According to Marcus Sachs, CSO with the North American Electric Reliability Corporation, doomsday fears of a cyberattack against the U.S. electric grid are overblown. Source: Infrastructure Security Squirrels, Not Hackers, Pose Biggest Threat to Electric Grid