News
The spyware operation's exposed customer email addresses and passwords were shared with data breach notification service Have I Been Pwned.
The most common type of attack here is a SIM swapping attack (also known as a SIM jacking attack): Essentially, your cell ...
How do hackers get access to your computer? Hackers have many tricks up their sleeves. Viruses and malicious software, aka malware, make the most of security gaps, but something called social ...
If you keep screenshots of login credentials or cryptocurrency seed phrases—or any sensitive content, really—in your phone's ...
Windows 10 support ends in October, and the company is telling millions of users their machines can’t support Windows 11.
Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distributes Android spyware under the guise of the Alpine Quest mapping software ...
European digital civil rights movement EDRi wants a full ban on the development, production, marketing, sale, export, and use of spyware in the European Union. “The use of spyware has become one of ...
I spy NPR's Lauren Frayer in London. LAUREN FRAYER, BYLINE: She may be the most famous spy chief on screen... (SOUNDBITE OF MONTAGE) JUDI DENCH: (As M) May I remind you that you're the reason I'm here ...
MARY LOUISE KELLY, HOST: This next story may be a case of life imitating art. Years after Judi Dench played James Bond's boss on the big screen, a woman will soon lead the real MI6, Britain's foreign ...
The threat actor used Paragon's Graphite spyware platform to target the victims' iPhone devices running iOS 18.2.1 and exploit CVE-2025-43200, which was a zero-day vulnerability at the time.
Spyware from a U.S.-backed Israeli company was used to target the phones of at least three prominent journalists in Europe, two of whom are editors at an investigative news site in Italy ...
You may know how to tell if your computer has been hacked and even if someone is spying on your iPhone, but do you know how to remove those problematic phone apps and other mobile security threats ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results