Tap here to turn on desktop notifications to get the news sent straight to you.
Join HuffPost Plus
I'm With Stupid: Hapless Luddite Prevails Over Modern Technology
Buckler of swashes
Thinking we'd finally done everything we needed to do to play the stinking game, we turned back to the Xbox, which had frozen up completely. No worries. We turned it off and let it reboot, but when it came back on, it immediately froze up again.
MakeSchool Co-Founder Ashu Desai Talks about, "The Computer Science Degree of the Future"
Founder of YouthHack
MakeSchool, which was originally named MakeGamesWithUs, was born after Ashu Desai and Jeremy Rossmann decided that they needed to fix the educational gap in CS education.
What Small Business Owners Need to Know About an IT Security Breach
Writer. Smalltowngirlandthebigcity.com ;Co-Founder of QueenCit...
If you are the owner of a business or a freelancer like I am, a lot of your work and information is kept through a variety of internet platforms. Additionally, a lot of your transactions are internet based.
Hey, Corporate Director!
Edward Guiliano, Ph.D.
President, New York Institute of Technology
The campaign to stop cyber-crime begins with educating the next wave of professionals, but ongoing education and idea exchange are the ultimate keys to confronting cybercrime on the ground and in the boardroom.
U.S. Takes Down Crime Ring That Infected Over 500,000 Computers
By Reuters, Reuters
The Gameover Zeus "botnet" - short for robot network - is the largest so far disrupted that relied on a peer-to-peer distribution
Russia, Please Keep Hacking
Author and former CEO
Imagine the hacker being debriefed by Gen. Alexander Bortnikov, Director of the FSB (successor to the KGB).
Big Data Breaches -- The Shape of Things to Come
Author, Speaker, Entrepreneur
Now that the impact of the Target data breach has grown from 40 million card members to 70 million, and to perhaps as high as 110 million, prepare for all sorts of mayhem because this data theft is just the start of things to come.
Your Computer Could Be Hacked Using Only Sound, Study Says
The conclusion? According to the study, "acoustical networking as a covert communication technology is a considerable threat
My Secret Life as a Bitcoin Miner - Part 1: The Basics
New Hacker Threat -- Targeting You Through Your Kids
CEO of Superior Solutions
It's important for parents to realize that just because you have parental controls on your computer, that doesn't mean your child is safe from online criminals. There are dozens of ways your kids could be targeted online, but here are the ones most likely to happen in your home.
Do you have info to share with HuffPost reporters?
Cloaking Data From Hackers: Interview With StrikeForce Co-Founder George Waller
CEO/Founder, CloudNician LLC
Until email is phased out with new collaboration tools, out-of-band authentication combined with cloaking data is a proven way to thwart hackers that consumers and corporations should invest in to protect their assets.
Was Aaron Swartz a Victim of Prosecutorial Overkill?
Bennett L. Gershman
Professor of Law, Elizabeth Haub Law School, Pace University
In the end, the single most significant check on a prosecutor's discretion is not the judicial courts, nor the court of public opinion. The only realistic check lies in the integrity and professionalism of prosecutors.
Dave Guillame, 'Clairvoyant,' Reveals His Secret In Safe Internet PSA Starring Hackers (VIDEO)
But after wowing guests with his amazing powers of seeing, a curtain falls away to reveal a team of reportedly "top-notch
Pre-Infected PCs Expose Flaws In Global Supply Chain
“It’s one of the toughest cybersecurity challenges out there,” said Tom Kellermann, vice president of cybersecurity at Trend
Hackers Reveal How They Accessed Syrian President Bashar Assad's Email Using World's Worst Password
They did not find it, but they did, however, find valuable information, including some they later used to protect opposition
Ryan Harris Given 3-Year Sentence For Helping Thousands Steal Internet Service
Harris is hardly the first hacker to get caught changing the configurations on cable modems in order to get free and faster
Director, Foreign Policy In Focus and Editor, LobeLog; Author ...
Listen to Washington and you'd think the U.S. was simply a healthy body under attack by foreign microbes in league with traitorous parasites within. But several major news stories paint a very different picture of the government's approach to cyber war.
Is It Possible for Hackers to Access My Computer's Webcam?
The best answer to any question
Yes, bad guys can definitely access your webcam. Therefore, people with more resources and more to gain (like criminals and
Internet Providers Agree to Fight 'Zombie' Computer Networks
Every month, about four million computers turn into zombies, according to researchers. Unbeknownst to their owners, who have
How Are Celebrity Cellphones Hacked?
COO, Superior Solutions
Celebrities are a perfect target for hackers -- they're highly visible, spend lots of time on their smartphones and they know next to nothing about security. It's no wonder they're often victimized by hackers.
8 Things You Won't Believe Can Be Hacked
If movies are to be believed, hackers are mostly kept busy fighting the man with CGI animations of smiley faces, or else
"Cyber Attack" -- Why It's Not a Great Phrase (But We're Stuck With It)
Technical Director for Cyber Security, BAE Systems Detica
It sounds fantastically sci-fi, and I can see why journalists in particular like it. But "cyber attack" is a really misleading term.
Hackers Disrupt Hong Kong Stock Exchange Trading
By Reuters, Reuters
The Hong Kong stock exchange was forced to suspend trading in stocks including HSBC Holdings after hackers broke into the
Hackers Can Use Text Messages to Break Into Locked Cars
A security consultant has identified a serious security glitch that allows him to break into cars -- via text message. Don
North Korean Hackers Hired To Attack South Korea Game Network
More than 30 North Korean hackers were hired to work in China by a South Korean crime ring to steal the personal data of
Chinese Cyberspying Debate Renewed By Security Firm Report
"There's pressure to not name names because the consequences of doing so are still unknown," he said. "If China is stealing
Real Life. Real News. Real Voices.
Help us tell more of the stories that matter from voices that too often remain unheard.
Join HuffPost Plus
Culture & Arts
TV & Film
Style & Beauty
Food & Drink
Home & Living
Impact: Project Zero
Impact: This New World
Listen to America
From Our Partners
What's Working: Purpose + Profit