Skip to main content

The Latest

  • Movie 'The Hacker Wars' proves we are under U.S. government surveillance
    Movie 'The Hacker Wars' proves we are under U.S. government surveillance
    On Oct. 14, 2014 Examiner Dorri Olds landed an exclusive interview with filmmakerVivien Lesnik Weismanto talk about her film, "The Hacker Wars."Weisman’s new documentary, “The Hacker Wars,” is frightening and a must-see...
  • Next move unclear after saved Snapchat image database leaked by hackers
    Next move unclear after saved Snapchat image database leaked by hackers
    After posting threats to 4Chan on Friday, hackers have released the database containing 13 gigabytes of Snapchat photos and videos on Sunday. According to The Guardian on Monday, a website called Snapsaved.com is the actual source of the leaked...
  • What to do in the Aftermath of an Attack
    What to do in the Aftermath of an Attack
    Can you hack cleaning up the mess a hacker makes after infiltrating your computer? Would you even know the first thing to do? And yes, YOU’RE computer CAN be hacked.After the attack, locate the portal through which the crumb-bag entered....
  • Researchers say your Mobile Carrier’s Network isn’t all that Secure
    Researchers say your Mobile Carrier’s Network isn’t all that Secure
    Gee, even the tools that update your smartphone’s operating system over the air have holes that hackers can slip into.It’s estimated that as many as two billion handsets are vulnerable, and in some instances, security patches haven...
  • Botnets Here, Botnets There, Botnets EVERYWHERE
    Botnets Here, Botnets There, Botnets EVERYWHERE
    What are these “botnets” you keep hearing about? Botnets (think roBOT + NETwork—gets you “BOTNET”) are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software&mdash...
  • How to Secure Your iCloud
    How to Secure Your iCloud
    By now you’ve heard that Jennifer Lawrence’s (and other celebs’) cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the “Find My iPhone” app...
  • Jennifer Lawrence naked hacked photos, is it her fault?
    Jennifer Lawrence asking for trouble with nude photos: Mindset running rampant
    The hacked nude photos of 100-plus celebrities seems to have put Jennifer Lawrence in the forefront of this mess, probably because she had more than 60 pictures hacked and posted online. These pictures were very personal and not meant for the...
  • Healthcare High on Hackers’ Hitlist
    Healthcare High on Hackers’ Hitlist
    If you think that retailers are the biggest target for cyber criminals, you have it more than a wee bit wrong. Hackers are really going after the healthcare and pharmaceutical industries. In fact, “Will Healthcare Be the Next Retail?”...
  • Hackers stole hospital info
    Sensitive info from 4.5 million American patients stolen by hacker group
    If you’ve been to a rural or small hospital in the United States in the last five years, your information may now be in the hands of Chinese hackers. A report from Recode on Monday states that hackers thought to be from China hacked into the...
  • I've been hacked, now what?
    I've been hacked, now what?
    You’re not special; a hacker CAN get into your computer or smartphone. Would you know how to clean up this mess?Start by locating the portal through which the hacker got in such as a browser, emal program. Next, disconnect/uninstall this...
  • Make Information Security a Priority
    Make Information Security a Priority
    Just about everyone has private information that should be protected. Let’s begin with something you’ve surely heard of: antivirus protection.But this isn’t enough to guard your personal data. A free antivirus service may not...
  • Malware Can Hide in the Most Obvious Places
    Malware Can Hide in the Most Obvious Places
    You never know when malware will bite. Even browsing an online restaurant menu can download malicious code, put there by hackers.Much has been said that Target’s hackers accessed the giant’s records via its heating and cooling system....
  • Government malware on phones
    Governments using personal phones, computers to spy on targets
    Researchers have discovered that governments are using the same methods of spying as hackers. According to the Associated Press on Tuesday, those methods include using their intended targets’ own computers and phones. Police and spy agencies...
  • iPhones
    Hacker 'Oleg Pliss' locks out Apple device users with 'Find My Phone'
    Phone hackers in Australia are proving that ransom notes aren’t a thing of the past, but they’ve modernized them a bit. According to CNET on Monday, hackers are using the Apple function ‘Find my iPhone’ to lock users out of...
  • Windows Internet Explorer
    Homeland Security issues 'national security alert' for Internet Explorer users
    The Department of Homeland Security (DHS) has issued a national security alert for all businesses and individual users of the web browser, Windows Internet Explorer, versions 6 through 11: do not use it."We are currently unaware of a...