T-Mobile fury as hackers steal customer data from credit agency
T-Mobile's chief executive has expressed outrage over a breach at a credit monitoring service that exposed private data from 15 million customers of the mobile carrier.
T-Mobile's chief executive has expressed outrage over a breach at a credit monitoring service that exposed private data from 15 million customers of the mobile carrier.
Security
Oct 2, 2015
0
28
Researchers at the University of Birmingham have developed a technique to allow people to cast their election vote online - even if their home computers are suspected of being infected with viruses.
Security
Apr 30, 2015
7
1437
Americans have been stepping up efforts to keep their data private since the revelations about vast US government surveillance programs, a survey showed Monday.
Internet
Mar 16, 2015
0
22
Online payments group PayPal announced Tuesday it was acquiring Israeli cybersecurity firm CyActive and establishing a new security hub in Israel.
Business
Mar 10, 2015
0
34
The boom in smartphones among often careless users has made happy hunting for hackers, whose virus attacks and hijacking of unprotected mobiles are multiplying, experts warn.
Security
Mar 5, 2015
2
682
Marriage therapist Valerie Goss turned on her computer one day and found that all of her data was being held hostage.
Security
Feb 26, 2015
2
30
It would be another powerful tool in the arsenal of US and British spy services: encryption keys for a large share of the SIM cards used for mobile phones.
Security
Feb 20, 2015
1
419
A Dutch company that makes SIM cards for cellular phones says it is investigating reports that it was hacked by Britain's electronic spying agency in cooperation with the U.S. National Security Agency.
Security
Feb 20, 2015
1
20
Advice for people seeking love on the Internet for Valentine's Day: keep looking, but watch for scams and other risks.
Security
Feb 13, 2015
1
23
In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspace ...
Security
Oct 29, 2014
0
0