Late on the evening of January 11, 2013, someone sent me an interesting email. It was encrypted, and sent from the sort of anonymous email service that smart people use when they want to hide their identity.
Sharyl Attkisson, the former CBS News correspondent who claims that her computers were hacked by the government while she was reporting on the Benghazi scandal, has released a video she took with her cellphone of one apparent hack...
Next time you download or update an app for your smartphone or tablet and blitz through messages asking for permissions approval, you may be unnecessarily exposing your personal information to possible cyber violation.
In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account.
The Electronic Frontier Foundation (EFF) launched its updated "Surveillance Self-Defense" report today, a comprehensive how-to guide to protecting yourself from electronic spying for Internet users all over the world.
Verizon Wireless has been subtly altering the web traffic of its wireless customers for the past two years, inserting a string of about 50 letters, numbers, and characters into data flowing between these customers and the websites they visit.
On Friday, President Obama signed an executive order to speed the adoption of EMV-standard cards in the US that will require credit card companies to stop relying on the magnetic stripe cards and move toward embedded chips
Nearly 7 million usernames and passwords from Dropbox, the free cloud service for storing your photos, videos, and documents across devices, were leaked onto the internet on Monday.
A cyberespionage campaign believed to be based in Russia has been targeting government leaders and institutions for nearly five years, according to researchers with iSight Partners who have examined code used in the attacks.
No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world.
• http://dealbook.nytimes.com, By Matthew Goldstein
The huge cyberattack on JPMorgan Chase that touched more than 83 million households and businesses was one of the most serious computer intrusions into an American corporation. But it could have been much worse.
It's been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference in Las Vegas...
Government documents handed over to defendant Ross Ulbricht's defense team have prompted the defense to cry foul. Ulbricht attorney wrote the "explanation of how the FBI discovered the server's IP address is implausible."
"No one in the chat rooms apparently bothered to explain that Gandhi spent a lot of time in jail, as did antiwar protesters in the 1970s." For using a piece of software on his computer that simply, repeatedly, pinged PayPal's servers, helping to brin
It's been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference in Las Vegas, showing that it's possible to corrupt any USB device with insidious,
Lawyers for some of the women involved in the widespread email hack claim Google could have helped stop the images circulated
Claim they instead chose to profit 'from the victimization of women'
FBI Director James B. Comey sharply criticized Apple and Google on Thursday for developing forms of smartphone encryption so secure that law enforcement officials cannot easily gain access to information stored on the devices —
A company that sells secure mobile phones has found more than a dozen "interceptor" cellphone towers in Washington, D.C., some of them located near the White House and the U.S. Capitol.
The Home Depot says it has eliminated malware from its US and Canadian networks that affected 56 million unique payment cards between April and September. There is no evidence that debit PIN numbers were compromised
Watch Streaming Broadcast Live:
LRN.fm
DLive
Live Chat Telegram
Share this page with your friends
on your favorite social network: