The Father of Online Anonymity Has a Plan to End the Crypto War
• WiredIt's been more than 30 years since David Chaum launched the ideas that would serve as much of the groundwork for anonymity online.
ON AIR NOW
Click to Play
It's been more than 30 years since David Chaum launched the ideas that would serve as much of the groundwork for anonymity online.
Hackers caused a power outage in Ukraine during holiday season, researchers say, signalling a potentially troubling new escalation in digital attacks.
The infamous dark web hacking forum called "Hell," where hackers and cybercriminals share stolen data and hacking tips, just relaunched months after it was shut down amid rumors of its founder being arrested and the forum being swarmed by underco
Kristov Atlas is a network security and privacy researcher who studies cryptocurrencies. He is currently a security engineer for Blockchain and co-founder of the Open Bitcoin Privacy Project. He is the author of "Anonymous Bitcoin:
In August, the Department of Homeland Security pressured a public library in the small town of Lebanon, New Hampshire to shut down a Tor node it was hosting on the popular anonymous browsing network.
More high-profile titans need to use their platforms to make crystal clear how important encryption is to users everywhere
My PayPal account was hacked on Christmas Eve. The perpetrator tried to further stir up trouble by sending my PayPal funds to a hacker gang tied to the jihadist militant group ISIS. Although the intruder failed to siphon any funds,
Hack attack proves influential news site over the target
Anonymous war on Isis: Online activists claim to have foiled terror attack on Italy as part of 'Operation Isis' ... Supporters of Anonymous have been working to shut down Twitter accounts and websites, but claims to have now disrupted attacks in the
identity via RFID hacking(NaturalNews) The last thing you're probably thinking about as you wrap up your holiday shopping is the possibility that identity thieves might be trying to steal your credit and debit cards, drivers license or other personal
One of the excellent features of new Windows devices is that disk encryption is built-in and turned on by default, protecting your data in case your device is lost or stolen.
A whitehat hacker has uncovered a database sitting on the Web containing various pieces of personal information related to 191 million American citizens registered to vote.
A movie piracy release group called Hive-CM8 says it's planning to leak no fewer than 40 top Hollywood movies over the next few weeks.
Every year hack attacks seem to get worse--whether in their sophistication, breadth, or sheer brazenness.
A TOP-SECRET document dated February 2011 reveals that British spy agency GCHQ, with the knowledge and apparent cooperation of the NSA, acquired the capability to covertly exploit security vulnerabilities in 13 different models of firewalls made by J
By design, encryption keeps secrets secret. Almost all the time, this is great, but it's vexing for politicians trying to campaign on their anti-terrorism credentials.
Encryption backdoors have been a hot topic in the last few years--and the controversial issue got even hotter after the terrorist attacks in Paris and San Bernardino, when it dominated media headlines.
"Hold this," he says, dumping a wireless keyboard in my lap before backing out of the garage. "But don't touch any buttons, or we'll die." Hotz explains his self-driving car setup is meant for highways, not chaotic city streets.
Privacy advocates were aghast in October when the Senate passed the Cybersecurity Information Sharing Act by a vote of 74 to 21, leaving intact portions of the law they say make it more amenable to surveillance than actual security.
Teenage hacktivists uncovered an astonishing web of unpublicized interactions which link ISIS social media accounts to the British government.
Teenage computer experts unveil astonishing web of unpublicised interactions linking extremist social media mouthpieces to the British government
The Government Really Doesn't Seem to Like Encryption
Please, Just Tell Us What Law You Need To Ban Encryption And You'll Get It
I announced my intention to survey the world market of cryptographic products. The goal is to compile a list of both free and commercial encryption products that can be used to protect arbitrary data and messages.
Hillary Clinton said on Sunday that the Islamic State had become "the most effective recruiter in the world" and that the only solution was to engage American technology companies in blocking or taking down militant websites, videos and encrypted
Lots of Bitcoin Companies and Media Outlets Need to Protect Themselves from Trespassers
Hackers affiliated with Anonymous have leaked the personal data of more than 1,000 officials at the UN climate talks in Paris.
Some large portion of the Internet of Things has essentially left its backdoor wide open. This is according to a report released Wednesday by security researchers at SEC Consult examining SSH cryptographic keys and HTTPS ....
Patrick Wood interviews Dr. Katherine Albrecht regarding "smart" devices, Internet of Things, pervasive surveillance and ways to take back your privacy.
This week, Anonymous is continuing their war on ISIS with a plan to spam their online hashtags with "rickroll" videos, the music video from Rick Astley 1987 hit song "Never Gonna Give You Up."