Latest Security Stories
Train Systems Are Vulnerable To Hacking
Hacked Medical Devices May Be The Biggest Cyber Security Threat In 2016
Carnegie Mellon Weakly Denies That It Got Paid To Help FBI Crack Anonymity Tool
Teen Hacker Claims He Accessed CIA Director’s Personal Email
Brilliant 10: Alex Halderman Strengthens Democracy Using Software
Intel Vows To Stop Car Hackers
Embedded 3D Barcodes To Ensure Pills Are Real
Why Do Hackers Want Your Health Data?
San Jose Considers License Plate Readers To Go On Garbage Trucks
Here’s How HTC and Samsung’s Fingerprint Scanner Was Hacked
Meet AVA, An App That Hacks Employees To Improve Security
New Japanese Glasses Block Facial Recognition
Thanks To This Device, Stealing Your Car Has Never Been Easier
Hackers Can Tap Into Hospital Drug Pumps To Serve Lethal Doses To Patients
Hacking Phones With The Touch Of A Hand
Malware Can Steal Data From Non-Networked Computers, Via Heat
This Box Can Figure Out Your 4-Digit iPhone Passcode
Face Recognition Security, Even With A ‘Blink Test,’ Is Easy To Trick
What’s The Worst Possible Password?
Pablos Holman Wants You To Break Your Gadgets
FREAK: Today, Web Users Feel The Impact Of ’90s Regulators’ Stupidity
The Blackphone 2 Is An Ultra-Secure Smartphone Made For Secret Agents
These Glasses Block Cameras From Recognizing Your Face
Hacked Hardware Could Cause The Next Big Security Breach
Smart Keyboard Could Be Self-Powered, Self-Secured, Self-Cleaning
7 Surprising Biometric Identification Methods
A Photograph Can Help Fool Your Phone’s Fingerprint Sensor
The Death Of The Password Starts Today (Maybe)
A Genetic Fog Machine That Tags Criminals
The First Home Iris Scanner
Square’s New Credit Card Reader Ensures Safer Transactions
What To Wear When You’re On The Run From The NSA
Security Experts Build $150 Safecracker
Hundreds Of Bluetooth Beacons Secretly Track New York City Passersby
Feds Bust Maker Of Smartphone “Stalker App”
The War Of Zeros And Ones
The Rise Of The Crypto Phone
Mysterious Phony Cell Towers Could Be Intercepting Your Calls
Weapons Can Be Carried Easily Through The TSA’s Full-Body “Naked” Scanners
Google Can Now Delete Your Past — But How Much Should Be Erased?
Invention Awards 2014: 360-Degree Infrared Vision
Israeli Students Spoof Waze App With Fake Traffic Jam
Edward Snowden On How To End Mass Surveillance
Inside Russia’s Ridiculous Sochi Security Scanner
Secret Viking Code Decrypted: ‘Kiss Me’
The End Of Anonymity
Poachers Try To Hack Data From Rare Tiger’s GPS Collar
Don’t Be Afraid Of Your DNA
NSA Has Secretly Been Hacking, Cracking, And Circumventing Encryption For Years
Tech-Law Blog Groklaw Shuts Down, Citing Government Surveillance
Is It Possible To Escape From Everyday Surveillance?
Secure Email Options for Message Privacy
5 Sneaky Ways The NSA Spies On Americans
Photograph Your House Key With This App, Then Print A Copy Anywhere
To Make An Unbreakable Code, Use Quantum Physics
The NSA Sucks More Than You Thought
Spy Agencies Have Banned Lenovo Computers, Fearing Chinese Hardware Hacks
The Biggest Data Thefts In Recent History [Infographic]
A Hacked Mobile Antenna In A Backpack Could Spy On Cell Phone Conversations
How Much Is Your Gmail Worth To A Hacker?
Overwhelm The NSA With Vice’s New Spam Generator
License Plate Readers Are Photographing You Everywhere
Can Putting Your Phone In The Fridge Keep It Safe From Eavesdroppers?
Store Your Housekey In the Cloud And Cut Copies On Demand