Security News

HONG KONG (AP) — Chinese tech stocks Lenovo Group and ZTE Corp. tumbled in Hong Kong on Friday following a news report Chinese spies might have used chips supplied by another company to hack into...

Lenovo slides by a fifth, ZTE sinks too on back of server allegations The ripple effect of explosive claims that Chinese government agents slipped snooper chips into Super Micro servers used by...

If Accurate, Bloomberg Report Would Mark a New Era of Mass Hardware CompromiseDid the Chinese government pull off one of the most secretive hardware hacks of all time? That's what information...

The major tech companies, scared that states like California might impose actual privacy regulations, have now decided that they can better lobby the federal government for much weaker national...

The rules would apply to all hosting service providers offering services in the E.U., regardless of size, even if they’re not based there.

Tech scammers are constantly coming up with new techniques to make users panic and seek their bogus services. The latest one, documented by Malwarebytes researchers, has been dubbed “evil cursor”....

Microsoft has taken down thousands of ads for tech support scams that infested the company’s TechNet support domain.

Manufacturers seem reluctant to do anything about it The privacy issues thrown up by connected cars don't seem to be going anywhere soon.…

Don't assume all hacking is high tech, says Frances Zelazny, VP at BioCatch. Low-tech hacking is still being used, and is also still working.

But Tech-Support Fraud is Surging, via Cold Calls, Phishing and More, FBI WarnsWhile tech-support scams have proliferated for years, the FBI says losses tied to such fraud are now higher than...