News Meet 'Project Zero,' Google's Secret Team of Bug-Hunting Hackers
http://www.wired.com, Andy Greenberg
When 17-year-old George Hotz became the world's first hacker to crack AT&T's lock on the iPhone in 2007, the companies officially ignored him while scrambling to fix the bugs his work exposed.
News Google's 'Security Princess' Leads A Team Of Hackers Paid To Think Like Criminals
"Security Princess" is the actual title Google's Parisa Tabriz has on her business cards.
News The Ex-Google Hacker Taking on the World's Spy Agencies
http://www.wired.com, By Andy Greenberg
During his last six years working as an elite security researcher for Google, the hacker known as Morgan Mayhem spent his nights and weekends hunting down the malware used to spy on vulnerable targets like human rights activists and political disside
News New Instant Messenger Plans to Leave No Metadata Worth Harvesting
A murders' row of cyber security experts have announced their intention to produce a new instant messaging service, designed for government and corporate whistleblowers (obviously) and the journalists they blow their whistles to. This should be fun.
News The Ultra-Simple App That Lets Anyone Encrypt Anything
Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn't figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video.
News A Look at The Senate's Cybersecurity Information Sharing Act of 2014
The Senate Intelligence Committee recently introduced the Cybersecurity Information Sharing Act of 2014. It's the fourth time in four years that Congress has tried to pass "cybersecurity" legislation.
News As Technology Advances, Cybersecurity Jobs Take Center Stage
Wearable tech, EHRs and smart appliances all point to a need for increased security and that may mean job growth.
News Active malware operation let attackers sabotage US energy industry
Researchers have uncovered a malware campaign that gave attackers the ability to sabotage the operations of energy grid owners, electricity generation firms, petroleum pipelines, and industrial equipment providers.
News ICLOAK Creates Revolutionary Way To Take Privacy Into Your Own Hands
http://benswann.com, By: Ben Swann
In this era of government spying, some are asking, "Where is the free market solution?"
News Snarky Lawmaker Reminds Former NSA Chief That Selling State Secrets Is Illegal
http://www.wired.com, By Kim Zetter
Cybersecurity firms and snake-oil salesmen promising protection from online threats are ubiquitous these days, and it's hard to stand out in such a crowded fieldunless you're the former leader of the world's best hacking outfit.
News Hospital Networks Are Leaking Data, Leaving Critical Devices Vulnerable
http://www.wired.com, By Kim Zetter
Two researchers examining the security of hospital networks have found many of them leak valuable information to the internet, leaving critical systems and equipment vulnerable to hacking.
News Watch the Global Cyber War Live Right Here
Well-organized hackers from China have been blamed for everything from crippling pro-democracy websites in Hong Kong to stealing corporate secrets from US companies in recent months.
News Rupert Murdoch: Scotland Yard want interview about crime at his UK papers
Detectives contacted media mogul last year but agreed with lawyers to wait until end of phone-hacking trial
News Google Glass Snoopers Can Steal Your Passcode With a Glance
The odds are you can't make out the PIN of that guy with the sun glaring obliquely off his iPad's screen across the coffee shop.
News Hedge-Fund Hackers Disrupting Trades for Profits, BAE Says
http://www.bloomberg.com, By Chris Strohm
Hackers disrupted high-speed trading at a large hedge fund and rerouted data that might be used to make money in rogue stock-market transactions, a security official with BAE Systems Plc (BA/) said.
News What are 'Dead Drops'?
'Dead Drops' is an anonymous, offline, peer to peer file-sharing network in public space. USB flash drives are embedded into walls, buildings and curbs accessible to anybody in public space. Everyone is invited to drop or find files on a dead drop. P
News Hackers: the Internet's immune system
The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve.