Antiques
Art
Books
Cameras, Photos
Cars, Boats, Motorcycles
Coins & Money
Collectibles
Entertainment Memorabilia
Everything Else
Fashion & Apparel
Jewelry & Watches
Music
Musical Instruments
Oddities
Pottery, Glass
Sporting Goods
Toys & Hobbies
Unknown Items
Categories
View all
Sports
Gaming
Science
Funny
DIY
Aww
Gifs
technology
hacks
Browse Categories
technology
Jul 22, 2020
Thieves Are Emptying ATMs Using a New Form of Jackpotting
ars technica
atm
cyberattacks and hacks
cybersecurity
external_partner
hacks
technology
Jul 06, 2020
AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals
ai
amazon
data bias
data privacy
facial recognition
hacks
ibm
law enforcement
malware
microsoft
mobile security
privacy
vulnerabilities
web security
technology
Jun 22, 2020
Anonymous Stole and Leaked a Megatrove of Police Documents
anonymous
hacks
law enforcement
security
web
technology
May 25, 2020
Home Chef Serves Up Data Breach for 8 Million Records
8 million
compromise
customer records
data breach
hacks
home chef
malware
mobile security
privacy
shiny hunters
underground forum
vulnerabilities
web security
technology
May 23, 2020
Calculator Hacked for Cheating Includes a Secret OLED Screen, Wifi, and Even a Chat Function
calculators
casio
casio fx-991ms
cheating
gadgets
gizmodo
hacks
neutrino
technology
Apr 18, 2020
Russian Hackers Went After San Francisco International Airport
hacks
malware
phishing
russia
security
security news
security roundup
vulnerabilities
technology
Apr 07, 2020
Apple Safari Flaws Enable One-Click Webcam Access
$75
000
apple
apple bug bounty
apple safari
apple vulnerability
hacks
ios
macos
malware
mobile security
patch
privacy
ryan pickren
safari bug
vulnerabilities
web security
webcam
webcam takeover
technology
Mar 25, 2020
WHO Targeted in Espionage Attempt, COVID-19 Cyberattacks Spike
apt
coronavirus
covid-19
cure
cyberattack
darkhotel
espionage
hacks
impersonation attacks
malware
mobile security
privacy
testing
vaccine
vulnerabilities
web security
world health organization
technology
Mar 05, 2020
Hackers Can Clone Millions of Toyota, Hyundai, and Kia Keys
car hacking
cars
hacks
technology
Feb 26, 2020
How a Hacker's Mom Broke Into a Prison—and the Warden's Computer
cybersecurity
hacks
prison
technology
Feb 16, 2020
Over 500 Chrome Extensions Secretly Uploaded Private Data
ars technica
chrome
data
google
hacks
technology
Feb 11, 2020
China's Hacking Spree Will Have a Decades-Long Fallout
china
data
hacks
privacy
technology
Jan 26, 2020
Cisco Warns of Critical Network Security Tool Flaw
cisco
critical flaw
cve-2019-16028
firepower management center
firewall
hacks
ldap
lightweight directory access protocol
malware
mobile security
network security
privacy
security solution
vulnerabilities
web security
technology
Jan 19, 2020
Equifax Settles Class-Action Breach Lawsuit for $380.5M
class action lawsuit
consumer payments
data breach
data breach fine
equifax
equifax data breach
equifax settlement
final settlement
ftc
hacks
malware
mobile security
privacy
vulnerabilities
web security
technology
Oct 15, 2019
Privacy Groups: Ring's Police Partnerships Can Lead to Sinister Ends | Threatpost
amazon
doorbell
facial recognition
hacks
law enforcement partnerships
malware
mobile security
open letter
privacy
privacy concerns
ring
senator markey
vulnerabilities
web security
technology
Sep 05, 2019
CEO ‘Deep Fake’ Swindles Company Out of $243k: using an AI-powered deep fake of a chief executive’s voice
ai
artificial intelligence
cybercrook
deep fake
enterprise security
hacks
malware
mobile security
privacy
scam
spear phishing
vishing
voice phishing
vulnerabilities
web security
technology
Aug 20, 2019
23 Texas government agencies hit with coordinated ransomware attack
cyberattack
hacks
malware
mobile security
privacy
ransom
ransomware
state and government ransomware
texas government ransomware
vulnerabilities
web security
technology
Aug 18, 2019
ThreatList: 4.1B Records Exposed in Breaches in First Half of 2019 | Threatpost
4.1 billion records
all time high
analysis
data breach activity
hacks
malware
mobile security
privacy
record levels
report
research
risk based security
vulnerabilities
web security
technology
Jun 26, 2019
Researchers Demonstrate How U.S. Emergency Alert System Can Be Hijacked and Weaponized - With a pirate cell tower, it's easy to send fake emergency alerts warning of a terrorist attack, nuclear bomb, or other disaster.
crime
culture
documentary
drugs
emergency alert system
entertainment
film
hackers
hacks
internet insecurity
journalism
lgbtq
news
politics
sex
travel
tv
video
wea
technology
Jun 20, 2019
Feds: Cyberattack on NASA’s JPL Threatened Mission-Control Data
april 2018
cyberattack
cybersecurity vulnerabilities
deep space network
hacks
jet propulsion laboratory
jpl
malware
mission control data
mobile security
nasa
network segmentation
oig report
privacy
security operations
vulnerabilities
web security
Next Page
Show the world who you are
We give you the most custom-tailored news feed on the web!
Get only the stories, pictures, gifs, & videos you care about.
At Show 1, you're in control! No spying, no tracking, no algorithmic manipulation, no BS!
×