Late on the evening of January 11, 2013, someone sent me an interesting email. It was encrypted, and sent from the sort of anonymous email service that smart people use when they want to hide their identity.
Sharyl Attkisson, the former CBS News correspondent who claims that her computers were hacked by the government while she was reporting on the Benghazi scandal, has released a video she took with her cellphone of one apparent hack...
Next time you download or update an app for your smartphone or tablet and blitz through messages asking for permissions approval, you may be unnecessarily exposing your personal information to possible cyber violation.
Agency requests rule change but civil liberties groups say 'extremely invasive' technique amounts to unconstitutional power grab.
In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account.
The Electronic Frontier Foundation (EFF) launched its updated "Surveillance Self-Defense" report today, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all over the world.
Verizon Wireless has been subtly altering the web traffic of its wireless customers for the past two years, inserting a string of about 50 letters, numbers, and characters into data flowing between these customers and the websites they visit.
On Friday, President Obama signed an executive order to speed the adoption of EMV-standard cards in the US that will require credit card companies to stop relying on the magnetic stripe cards and move toward embedded chips
It won't protect you at all
Nearly 7 million usernames and passwords from Dropbox, the free cloud service for storing your photos, videos, and documents across devices, were leaked onto the internet on Monday.
The past few weeks have seen a flurry of hacker activity.
A cyberespionage campaign believed to be based in Russia has been targeting government leaders and institutions for nearly five years, according to researchers with iSight Partners who have examined code used in the attacks.
No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world.
She's also teaching the cloud to forget personal information.
Bitcoin magnate Roger Ver has launched a new site designed to help catch criminals by offering anonymous cryptocurrency bounties.
Police Distribute Hundreds Of Thousands Of Copies Of Keylogging Spyware That Transmits What A User Types Over The Internet.
I read that Apple and Google have begun encrypting the data of customers so that nobody, including Apple and Google, have plaintext access to it.
Names Encrypted for Their Security
The huge cyberattack on JPMorgan Chase that touched more than 83 million households and businesses was one of the most serious computer intrusions into an American corporation. But it could have been much worse.
JPMorgan Chase & Co., the biggest U.S. bank, said a previously disclosed data breach affected 76 million households and 7 million small businesses.
It's been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference in Las Vegas...
Government documents handed over to defendant Ross Ulbricht's defense team have prompted the defense to cry foul. Ulbricht attorney wrote the "explanation of how the FBI discovered the server's IP address is implausible."
"No one in the chat rooms apparently bothered to explain that Gandhi spent a lot of time in jail, as did antiwar protesters in the 1970s." For using a piece of software on his computer that simply, repeatedly, pinged PayPal's servers, helping to brin
It's been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference in Las Vegas, showing that it's possible to corrupt any USB device with insidious,
Lawyers for some of the women involved in the widespread email hack claim Google could have helped stop the images circulated Claim they instead chose to profit 'from the victimization of women'
Apple and Google have finally encrypted your phone data by default. And that's a bad thing?
Surveillance is increasing.
FBI Director James B. Comey sharply criticized Apple and Google on Thursday for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices —
A company that sells secure mobile phones has found more than a dozen "interceptor" cellphone towers in Washington, D.C., some of them located near the White House and the U.S. Capitol.
The Home Depot says it has eliminated malware from its US and Canadian networks that affected 56 million unique payment cards between April and September. There is no evidence that debit PIN numbers were compromised