In a situation where many employees work from home or access wi-fi networks that operate at enterprise-level security, devices such as routers can be hacked to plant a range of malware
USA's new strategy report adds Cuba, Hezbollah, Islamic State and Al-Qaeda as groups able to undertake intelligence operations against the country.
The hackers also used malicious software which can access other data on a victim's computer
IBM's technology leverages various forms of AI, including machine-learning algorithms and deep-learning networks that get stronger and smarter over time
Known for its sprawling resorts and casinos, Las Vegas once a year becomes the gathering place for tens of thousands of cybersecurity enthusiasts who attend DEF CON
US intelligence agencies have charged that Russia was behind a string of hacks in the 2016 presidential campaign in a bid to boost support for Donald Trump
Instruments in smartphones such as the gyroscope and proximity sensors represent a potential security vulnerability
Hackers appear to be focusing on anyone who talks on social media about owning virtual currencies
The security weaknesses of vendors are increasingly the weaknesses of their clients
"The complainant had provided voluminous data, requiring careful analysis
Probe has so far revealed that the site was hacked on Monday night and the hackers also posted a message - "hacked by Pakistani hackers Mister ji"