ORSZYSZ, Poland -- As U.S. Army Lt. Col. Christopher L’Heureux, commander of the NATO base in Poland, wrapped up a day of military exercises in Poland, he checked his iPhone and noticed something irregular.
By Zach Fannin, producer
Two of the world's most notorious "darknet" marketplaces have been knocked out in a one-two punch that officials say yielded a trove of new intelligence about drugs and weapons merchants that operate from hidden corners of the internet.
By Raphael Satter and Frank Bajak, Associated Press
The risks posed by the lax security, experts say, go well beyond simple digital snooping. Sophisticated attackers could take advantage of vulnerabilities in the Wi-Fi networks to take over devices like computers or smart phones and use them to record…
By Jeff Larson, ProPublica and Julia Angwin, ProPublica
In the newest Pirates of the Caribbean film, Captain Jack Sparrow is dogged by deadly ghost pirates, led by the maniacal Captain Salazar. In real-life, he’s apparently being pursued by a different kind of foe: hackers that claim to be…
By Elizabeth Flock
By PBS NewsHour
As French voters prepare to head to the polls, presidential candidate Emmanuel Macron confirmed he had been the target of a “massive hacking attack,” with campaign emails and financial documents posted online. Macron's campaign said that authentic documents were released…
By Eric Tucker, Associated Press and Michael Liedtke, Associated Press
A scheme uncovered during a federal investigation into a huge Yahoo security breach may have opened a window into other hacks potentially instigated by foreign governments, according to computer security experts.
By Associated Press
The Justice Department is expected to announce charges tied to a mega breach of Yahoo user accounts. Federal officials are expected to make a cybercrime announcement Wednesday morning.
WikiLeaks' release of a trove of documents about the CIA's ability to breach smartphone and TV encryption was a revelation of potential vulnerabilities that surprised many. Hari Sreenivasan separates fact from fiction about their capabilities to take advantage of those…
A day after WikiLeaks published documents on the CIA's tools for hacking into personal electronics, Reuters reported that intelligence officials are focused on contractors as the likeliest source of the leak. How is the CIA likely responding to the revelations?…
Support Provided By: Learn more