Tweet Recently we learned that it is probable that the intruders obtained a copy of a backup file with information about Steam transactions between 2004 and 2008. This backup file contained user names, email addresses, encrypted billing addresses and encrypted credit card information. It did not include Steam passwords. We […]
Tweet That's twice in two days. Yesterday, security firm Zvelo discovered a potential exploit against rooted phones. Today, tech blog TheSmartphoneChamp discovered how to accomplish the same feat on non-rooted phones. While yesterday's exploit required you to crack encrypted files, today's requires you to simply clear the data in the […]
Tweet The good ol’ days are gone when computer crackers and hackers used to focus on breaking into your desktop or servers just to prove a point. That is soon changing now that computers are living in just about every device you touch from your cell phones to you car.