A security flaw could potentially allow hackers or government spies to slide into group chats unnoticed.
In an urgent message about the 2018 midterms Democrats warn of a "clear" threat from Moscow to U.S. national security.
A computer security company warned that further threats to the Winter Olympics could follow.
A database of 1.4 billion user passwords compiled from 252 data breaches is suspected to be the largest ever.
Twitter says the employee went rogue on their last day of work. Security experts say that poses a danger.
China is leading the world in developing unbreakable encryption using quantum physics.
Bad Rabbit is spreading "in a worm-like fashion" between computers.
A cybersecurity researcher sent vibrate commands to a butt plug from his laptop.
Cybersecurity researchers say hackers have targeted the adult website for over a year.
The secret tool allows Uber or hackers to record screens even when users aren’t using the app.
The cyber threat to the U.S. from China is mostly one of "rampant" espionage.
A data breach at drive-in food chain Sonic compromised the security of credit cards from up to 5 million customers. Why is this still happening?
Early iPhones literally put the “smart” in the smartphone, connecting texting, internet connectivity and telephone capabilities in one intuitive device.
A new report ranks U.S. federal government cybersecurity behind that of the fast food industry.
There was a 40 percent increase in government data breaches last year, with 72 across American government systems.
Last year there was a 40 percent increase in government data breaches, with 72 across American government systems.
Obama officials like former Secretary of Homeland Security Jeh Johnson warn Russia and others will be back to meddle in elections if Trump isn’t careful.
Beijing will have oversight of multinationals’ data, including their intellectual property.
Reports say that President Trump has already handed out his digits to leaders in Canada, Mexico and France.
Newly found flaw in widely used networking software is yet to be exploited by hackers.