As privacy advocates celebrate the FBI's decision to stop harassing Apple over the San Bernardino shooter's encrypted iPhone, other tech giants seem to have finally noticed that what consumers want is privacy.
The U.S. government was robbed. Last month, hackers stole $100 million from the Federal Reserve. Authorities recovered $19 million, and the hackers got away with $81 million. It was the largest bank robbery in history.
Tech-savvy people have had a way to send secure email since the mid 1990s, when legendary cryptographer Phil Zimmermann created the encryption software known as Pretty Good Privacy, or PGP.
Political dissidents and cyber criminals alike will soon be sending anonymous internet traffic through a library at Western University in Canada, thanks to a new "node" in the encrypted Tor network operated by staff there--the first to open at a
Technology companies could face civil penalties for refusing to comply with court orders to help investigators access encrypted data under draft legislation nearing completion in the U.S. Senate, sources familiar with continuing discussions told Reut
WASHINGTON (Reuters) - Technology companies could face civil penalties for refusing to comply with court orders to help investigators access encrypted data under draft legislation nearing completion in the U.S. Senate, sources familiar with continuin
Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
As the legal tussle between Apple and the FBI continues, the head of UK intelligence agency Government Communications Headquarters (GCHQ) has called for more collaboration between academics, civil society, government, and the tech industry to find a
Reports indicate that some of the stolen funds were traced to the Philippines, but given what we know about the "Cyber Axis of Evil," we can only suspect it was Iranians, Chinese, or the criminal/military mastermind Kim Jong-Un who was behind the sca
The US Department of Defense may boast the world's most powerful military, but its online databases are far from indomitable, as a recent spate of apparent cyberattacks seems to suggest.
While Apple is fighting the FBI in court over encryption, Amazon quietly disabled the option to use encryption to protect data on its Android-powered devices.
The US public doesn't need a Digital Security Commission, they need the FBI to stop deceiving everyone and tell the truth that it wants to spy on Americans, John McAfee, developer of the first commercial anti-virus program told RT's Ed Schultz.
A student stole teacher Leigh Anne Arthur's cell phone, found a nude picture on the device, then sent the image to other students through text messages and social media.
The FBI tells us that its demand for a back door into the iPhone is all about fighting terrorism, and that it is essential to break in just this one time to find out more about the San Bernardino attack last December.
Apple, summoned to Capitol Hill to explain why it is refusing to help the government access a terrorist's phone by developing malware to hack in, says Congress should be the one answering questions.
When the IRS first reported a hack that exposed taxpayer accounts' vulnerable information, it pegged the number of affected people at a little over 100,000.
A locked phone used by a dead terrorist initially may have seemed like the perfect test case for law enforcement to argue that it needs ways to get around advanced device security.
FBI Director James Comey reversed himself on Thursday when he acknowledged that the outcome of a California court order compelling Apple to write new code to unlock a terrorist's phone could "be instructive for other courts" ...