During his last six years working as an elite security researcher for Google, the hacker known as Morgan Mayhem spent his nights and weekends hunting down the malware used to spy on vulnerable targets like human rights activists and political disside
A murders' row of cyber security experts have announced their intention to produce a new instant messaging service, designed for government and corporate whistleblowers (obviously) and the journalists they blow their whistles to. This should be fun.
Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn't figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video.
The Senate Intelligence Committee recently introduced the Cybersecurity Information Sharing Act of 2014. It's the fourth time in four years that Congress has tried to pass "cybersecurity" legislation.
Researchers have uncovered a malware campaign that gave attackers the ability to sabotage the operations of energy grid owners, electricity generation firms, petroleum pipelines, and industrial equipment providers.
Cybersecurity firms and snake-oil salesmen promising protection from online threats are ubiquitous these days, and it's hard to stand out in such a crowded field—unless you're the former leader of the world's best hacking outfit.
Two researchers examining the security of hospital networks have found many of them leak valuable information to the internet, leaving critical systems and equipment vulnerable to hacking.
Well-organized hackers from China have been blamed for everything from crippling pro-democracy websites in Hong Kong to stealing corporate secrets from US companies in recent months.
Hackers disrupted high-speed trading at a large hedge fund and rerouted data that might be used to make money in rogue stock-market transactions, a security official with BAE Systems Plc (BA/) said.
'Dead Drops' is an anonymous, offline, peer to peer file-sharing network in public space. USB flash drives are embedded into walls, buildings and curbs accessible to anybody in public space. Everyone is invited to drop or find files on a dead drop. P
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights.
On Wednesday afternoon, the official website for the TrueCrypt encryption software — which allows users to encrypt hard drives and sensitive files — was updated to say that it is no longer safe to use. While the website does not provide additional de
Watch Streaming Broadcast Live:
LRN.fm
DLive
Live Chat Telegram
Share this page with your friends
on your favorite social network: