Snowden: Without encryption, everything stops
• The HillFareed Zakaria and Edward Snowden debate "Government should have lawful access to any encrypted message or device," at the TimesCenter, April 26th, 2016. [VIDEO]
ON AIR NOW
Click to Play
Fareed Zakaria and Edward Snowden debate "Government should have lawful access to any encrypted message or device," at the TimesCenter, April 26th, 2016. [VIDEO]
A series of data breaches overseas are spurring concerns that hackers could manipulate elections in the United States.
NSA whistleblower and privacy advocate Edward Snowden took part in his first public debate on encryption on Tuesday night, facing off against CNN's Fareed Zakaria, a journalist and author known for his coverage of international affairs.
The FBI informed Apple of a vulnerability in its iPhone and Mac software on April 14, the first time it had told the company about a flaw in Apple products under a controversial White House process for sharing such information, the company told Reute
A power company in the Midwest hired a group of white hat hackers known as RedTeam Security to test its defenses. We followed them around for 3 days, as they attempted to break into buildings and hack into its network, with the goal of gaining full a
THE DIRECTOR OF NATIONAL INTELLIGENCE on Monday blamed NSA whistleblower Edward Snowden for advancing the development of user-friendly, widely available strong encryption.
While the FBI keeps crying wolf about the dangerous dark future where criminals use technology that's impossible to spy on, the Pentagon's blue-sky research arm wants someone to create the ultimate hacker-proof messaging app.
DHAKA (Reuters) - Bangladesh's central bank was vulnerable to hackers because it did not have a firewall and used second-hand, $10 switches to network computers connected to the SWIFT global payment network, an investigator into one of the world's bi
The activist talks to Popular Science about digital naïveté
Parents, listen up: Put your kids in engineering and computer science classes
This is the story of how ShapeShift, a leading blockchain asset exchange platform, was betrayed. Not once, not twice, but three times in less than a month.
You have to admit that the US government has a pretty dismal record when it comes to computer security.
A draft of the Compliance with Court Orders Act of 2016 was officially released last week, confirming that the WikiLeaks release was accurate. Written by Senate Select Committee on Intelligence Chairman Richard Burr and Vice Chairman Dianne Feinstein
Bill Gertz for the Washington Free Beacon reports, Chinese military hackers are conducting cyber attacks on the Pentagon's Missile Defense Agency networks on a daily basis and will soon shift to hacking into networks of missile defense contractors,
"60 Minutes" correspondent Sharyn Alfonsi traveled to Berlin, where she interviewed a team of hackers who are looking for vulnerabilities in mobile phone systems so they can warn the public of the risks they face.
Back in July of last year, the controversial government spying and hacking tool seller Hacking Team was hacked itself by an outside attacker. The breach made headlines worldwide, but no one knew much about the perpetrator or how he did it.
It's getting harder and harder to trust opaque and unaccountable algorithms. Anyone who thinks we should have electronic voting machines -- or worse, Internet voting -- needs to pay attention.
'I feel sorry to say that your company is now essentially dead,' one person on a coding forum advised Marco Marsala
As a result of the FBI's battle with Apple
End users should not have to worry about managing encryption keys when they want to communicate securely, but they also should not have to trust their secure communication service providers to act in their interest.
The Panama Papers Law Firm Had Seriously Shoddy Security
The revelation that an Israeli firm cracked the iPhone raises questions about state-corporate espionage.
As Apple battled the FBI for the last two months over the agency's demands that Apple help crack its own encryption, both the tech community and law enforcement hoped that Congress would weigh in with some sort of compromise solution.
You might assume that people in the most oppressive regimes wouldn't use the Tor anonymity network because of severe restrictions on technology or communication.
Sites on the so-called dark web are designed to protect the anonymity of both their visitors and owners.
Andrés Sepúlveda rigged elections throughout Latin America for almost a decade. He tells his story for the first time.
Andrés Sepúlveda rigged elections throughout Latin America for almost a decade. He tells his story for the first time. It was just before midnight when Enrique Peña Nieto (PRI) declared victory as the newly elected president of Mexico.
Seattle police say it "served a warrant at the home while investigating information received from the National Center for Missing and Exploiting Children" involving the possible distribution of child pornography. A judge signed the warrant.
The FBI has agreed to help prosecutors gain access to an iPhone 6 and an iPod that might hold evidence in an Arkansas murder trial, just days after the agency managed to hack an iPhone linked to the San Bernardino terror attacks, a local prosecutor s
Apple's standoff with the FBI unfolded over the course of several weeks, but ended in a matter of days.