Paul Rosenberg (Freeman's Perspective) - Josh Gay (Licensing and Compliance Manager @ Free Software Foundation) on network security and the NSA - Charles Goyette (Author; Former talk show host) on the upcoming Mises Circle event in Phoenix Nov 7th
James Paul Author of Syria Unmasked) on the Syrian refugee situation - Christoper Waid (Founder and CEO of Think Penguin) and Jay Kalafus on network security (PUBLISHER RECOMMENDED - TPM Chip, They/Them/Those a'com'n
This week, Excellus Blue Cross Blue Shield was hacked, and anywhere from 10 to 10.5 million people's personal records were exposed.
"We are the unwitting victims of a system so corrupt that those who stand up for the rule of law and aspire to transparency in government are in the minority." said John Whitehead.
The Rutherford Institute, Wikipedia, ACLU Et Al. Ask Federal Court to Reject Government Motion to Dismiss Lawsuit Over the NSA's Mass Surveillance Program...Pointing to extensive evidence that the government is systematically copying and substantiall
Online ads are fast becoming an endangered species, and as ad-blocking technology becomes more popular, it is finally reaching one of advertising's final frontiers: mobile browsers.
The developers of Darkwallet, the intentionally controversial and OBPP award winning Privacy Bitcoin client are believed to have abandoned the project. One of the developers, Amir Taaki, is allegedly busy "developing something that requires a lot o
The NSA was sloppy about guarding its classified secrets from Edward Snowden, but no one at the agency is in danger of being prosecuted for that security lapse.
If we're to have any hope for the future, it will rest with those ill-mannered, bad-tempered, uncivil, discourteous few who are disenchanted enough with the status quo to tell the government to go to hell using every nonviolent means available.
Imagine this: NSA or GCHQ implants malware on your computer that instructs it to copy certain kinds of data into empty memory separate from your hard drive or flash chips. You, the owner, may think you wiped the device clean, but you really didn't.
According to experts, these kinds of calls are step one in a phone fraud scheme that could lead to your identity being stolen and/or your bank account drained. The silence on the other end of the phone is actually a computer gathering information abo
Australian lawmaker shocked as hackers pinpoint location, view texts in real-time
The internet giant is defending the right of an indicted Rand Paul aide to keep his emails out of government hands.
Hackers dump SECOND, even bigger batch of Ashley Madison records with taunting message to millionaire founder of 'cheating dirtbag' site
Hackers who stole sensitive customer information from the cheating site AshleyMadison.com appear to have made good on their threat to post the data online.
The new glasses called "Privacy Visor," can trick facial recognition technology, and prevent cameras from tracing your identity.
Three months ago, Harvard student Aran Khanna was preparing to start a coveted internship at Facebook when he launched a browser application from his dorm room that angered the social media behemoth.
Chelsea Clark's night watching Netflix with her boyfriend didn't seem like anything out of the ordinary -- until pictures of the couple from that evening were sent to her Facebook account by the hacker who'd taken them from her webcam.
System will collect information on user in exchange for free wi-fi
But like the rest of the rapidly evolving Microsoft, he also realizes that so much of the world now runs Linux, the Windows alternative built by a vast community of open source software coders.
Silent Pocket is a wireless shielding technology integrated into sleek leather goods like bags, pouches, backpacks, etc. which makes any device undetectable by instantly blocking cellular, GPS, WIFI, Bluetototh, RFID and NFC in all frequencies.
It was disclosed her top aides are being drawn into a burgeoning federal inquiry and that two emails on her private account have been classified as "Top Secret."
Your communications and personal data belong to you and you alone. You wouldn't allow anyone into your home to just snoop around, so why would you tolerate unauthorized government snatching of everything you say in messages, email or phone calls?
Last week's GOP presidential "debate" was more interesting than expected. While Donald Trump certainly enlivened the event, the night's most substantive discussion was the Chris Christie – Rand Paul exchange on warrantless National Security Agency
George Washington could have become a king, but instead devoted his life to giving power back to the people. This is why his political heritage remains so strong today, inspiring millions around the world to continue striving for liberty and democrac
In April, we brought you the "FAKE-O" score or, as we delicately described it, "banks' brilliant plan to lend to deadbeats."
Billions of messages served securely and privately in almost every country in the world...Escape the internet
U.S. officials tell NBC News that Russia launched a "sophisticated cyberattack" against the Pentagon's Joint Staff unclassified email system, which has been shut down and taken offline for nearly two weeks.
The dream of a free and open Internet is slowly being killed by overregulation, censorship and bad laws that don't stop the right people, a top computer crime defense lawyer says.
Drone have been used to drop bombs, spy on foreign countries and monitor how farmers work their fields. Now they could help hack into personal computers.