During his last six years working as an elite security researcher for Google, the hacker known as Morgan Mayhem spent his nights and weekends hunting down the malware used to spy on vulnerable targets like human rights activists and political disside
A few days ago, we asked a simple rhetorical question: "Are you targeted by the NSA?"
A murders' row of cyber security experts have announced their intention to produce a new instant messaging service, designed for government and corporate whistleblowers (obviously) and the journalists they blow their whistles to. This should be fun.
Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn't figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video.
How regional networks may replace the World Wide Web
Penguinista mag readers, privacy-conscious netizens and more targeted, claims report
The Senate Intelligence Committee recently introduced the Cybersecurity Information Sharing Act of 2014. It's the fourth time in four years that Congress has tried to pass "cybersecurity" legislation.
Wearable tech, EHRs and smart appliances all point to a need for increased security – and that may mean job growth.
Researchers have uncovered a malware campaign that gave attackers the ability to sabotage the operations of energy grid owners, electricity generation firms, petroleum pipelines, and industrial equipment providers.
Boffins scheme to help blow up nukes could also be handy for electronic voting
In this era of government spying, some are asking, "Where is the free market solution?"
Cybersecurity firms and snake-oil salesmen promising protection from online threats are ubiquitous these days, and it's hard to stand out in such a crowded field—unless you're the former leader of the world's best hacking outfit.
How corporations became people you can't sue.
Two researchers examining the security of hospital networks have found many of them leak valuable information to the internet, leaving critical systems and equipment vulnerable to hacking.
Well-organized hackers from China have been blamed for everything from crippling pro-democracy websites in Hong Kong to stealing corporate secrets from US companies in recent months.
Detectives contacted media mogul last year but agreed with lawyers to wait until end of phone-hacking trial
Post provides rare glimpse inside Android-based "lawful intercept" app.
Havex operators target mission-critical controllers around the world.
Health department hack leaves 1.3 million vulnerable
Who's watching the watchers? Experts expose wide spying abilities of law enforcement hackers
The odds are you can't make out the PIN of that guy with the sun glaring obliquely off his iPad's screen across the coffee shop.
Hackers disrupted high-speed trading at a large hedge fund and rerouted data that might be used to make money in rogue stock-market transactions, a security official with BAE Systems Plc (BA/) said.
Expect a busy DEFCON with lots of new pwnage products
Is everything fatally borked? Not quite, say security godheads
'Dead Drops' is an anonymous, offline, peer to peer file-sharing network in public space. USB flash drives are embedded into walls, buildings and curbs accessible to anybody in public space. Everyone is invited to drop or find files on a dead drop. P
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve.
Until recently, anyone may have been able to assemble a list of every Gmail account in the world.
I am surprised that so many people are unaware of the smart meter controversy.
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights.
On Wednesday afternoon, the official website for the TrueCrypt encryption software — which allows users to encrypt hard drives and sensitive files — was updated to say that it is no longer safe to use. While the website does not provide additional de