Hacking

"I can sleep tonight better knowing I took my power back," she wrote on Twitter.
According to a new court filing, a Twitter account swiped evidence from the special counsel Robert Mueller’s case in an attempt to tarnish the investigation.
The leak reportedly included addresses, personal letters and copies of identity cards.
Deputy Attorney General Rod Rosenstein announced that the Department of Justice is charging two Chinese citizens for hacking U.S. companies on behalf of the Chinese government.
The attempts to break in to emails of U.S. Treasury officials, Arab atomic scientists and D.C. think-tank employees illustrate Tehran's espionage priorities.
The hotel chain's investigation found that an unauthorized party had copied and encrypted information from its Starwood Hotel brand's guest database since 2014.
DOJ expects to soon prosecute Assange, who has been living in London, reports The Wall Street Journal.
Georgia’s Republican candidate for governor Brian Kemp is accusing Democrats of hacking the state’s voter database.
Around 380,000 card payments were compromised over a two-week period, the airline said.
George Garofano and his accomplices also targeted other celebrities, including Kirsten Dunst and Kate Upton.
Unknown hackers created a fake login page to try to gather usernames and passwords.
One manufacturer says the exercises are not a useful test of vulnerabilities; hackers disagree.
One tip: Before you Insta that photo, pay attention to what's in the background.
News comes a day after Trump agrees to drop sanctions against Chinese telecom giant ZTE.
The president is said to use a cellphone that lacks top security features and ignores advice to regularly swap his Twitter phone.
Scammers may be using Harry-and-Meghan mania to get your security info.
The MSNBC host's most ardent fans are willing to turn a blind eye to her hacking claims, and that's unsettling.
This is the second time the MSNBC host has been accused of making homophobic comments on an old blog.
Toronto-based Hudson’s Bay did not say when the breach had begun or how many payment card numbers were taken.