And A Video She Created About It Has Gone Viral
In their obsession to stop Iran from developing nuclear weapons, the U.S. and Israel created a computer virus (called “Stuxnet”) to take out Iran’s nuclear reactors.
If you're the type of person who likes to know that he or she can email or send files with the knowledge that you're doing so completely securely, you'll want to check out Perzo.
If you've ever shopped online, and chances are you have, you've probably noticed, or been told to look for, certain indicators that you have a secure Web connection.
NSA Hacks Google. How could it affect you? Emails? Online searches? Think bigger…
Dave Wright had $16,500 of the crypto-currency Bitcoin transferred from his account without his knowledge.
Friday's attack on the NSA is likely retribution for recent spying scandals. The NSA has come under fire for its electronic eavesdropping on millions of Americans, as well as citizens and even politicians of foreign countries. The latest scandal was
Update: As of 6:30 pm Eastern, the NSA's website has been down for 5 hours.
Wikipedia is the largest free source of information in the world. The sixth most widely used website in the world is not run anything like the others in the top 10.
Just who is looking over your shoulder when you browse the Internet?
Fiber optic undersea cable bypassing U.S. to be completed by 2015
If you think that our multi-billion dollar electrical power grids are secure and capable of withstanding a coordinated attack, think again.
An exclusive report from Reuters details how at the base in Hawaii where Edward Snowden was assigned, plans to install "anti-leak" software were delayed because the facility did not believe they had sufficient bandwidth to ensure its effective operat
The company doesn't think hackers got decrypted credit/debit card numbers
Scanning a smartphone for malware with a charger offers more protection than security apps ever can.
The biggest drug marketplace on the internet has been busted. The illicit empire of the Silk Road came crashing down on Wednesday after its founder Ross Ulbricht, aka Dread Pirate Roberts , was arrested and charged with narcotics trafficking, money l
Mere days after the US and Iran showed very tentative signs of some diplomatic progress being possible (and hours after Netanyahu's "Rouhani's a wolf in sheep's clothing" comments), The Telegraph reports that Mojtaba Ahmadi, who served as commander o
Since you follow me on Twitter, you’re aware I post a lot of Instagram photos to my feed.
Well, they do say attack is the best form of defence. Britain is to develop the capability to launch cyberattacks, not just defend against incoming threats, UK defence secretary Philip Hammond announced this week.
A former Sun journalist has become the first person to be charged as part of Operation Tuleta, Scotland Yard’s investigation into allegations of computer hacking and other privacy breaches.
A new report has outed a shadowy organisation called Hidden Lynx – a 100-strong group of expert hackers who are available for hire
The first thing you see upon arrival at GitHub's brand new San Francisco headquarters is Ryan Tomayko's Macbook Pro.
A new cyber-theft ring from Asia is committing a string of smash and grab-style attacks against suppliers to major military contractors.
Dubbed as a "game-changer" despite being around on devices for years (Motorola Atrix anyone); a 'paradigm' shift in mobile payment security; and a revolution in handheld devices by any and all investors bullish of the stocks; Appl's fingerprint-scann
A St. Petersburg city lawmaker known for his conservative views cautioned Russian officials Monday against using Apple’s new iPhone until there is proof that the advanced technology is safe from US spying.
How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice.
It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware desig
There’s a lot of talk around biometric authentication since Apple introduced its newest iPhone, which will let users unlock their device with a fingerprint.
Mathematicians and computer scientists are involved in enabling wide intrusions on individual privacy.
Topple’s bravado is put to the test when his old-school spy game gets the green light.