Kevin Mitnick, one of the individuals included in eWEEK's Top Hackers slideshow, appeared on Comedy Central's Colbert Report on Aug. 18. Mitnick, on a...
in a report based on four years of Web data, Google researchers found that attackers are deploying highly specialized evasion and obfuscation techniques to...
About 45,000 Verizon landline workers from Massachusetts to Virginia went on strike Aug. 7, fighting management demands for contract givebacks. With the rise in...
Identity Finder released a detailed analysis of the data hacktivist collective Anonymous released Aug. 14 after successfully breaching the myBART.org Website. The attack on...
Cyber-attacks are no longer limited to just computers. At Black Hat, a security researcher discussed how an attacker with a powerful antenna could launch...
Two security researchers demonstrated how to outfit a radio-controlled model airplane with a computer and 4G connectivity to create a nearly undetectable aerial hacking...
Modern automobiles are increasingly becoming more like computers, with features such as the in-car navigation system and multiple sensors tracking the fuel tank and...
Facebook has joined the handful of companies who pay bug bounties to researchers who discover vulnerabilities.Most Website flaws, such as cross-site scripting, cross-site request...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...