Hillary Clinton has yet to offer a definitive policy stance on strong end-to-end encryption, the mathematical algorithms that protect our data, instant messages, and web browsing. Instead of calling for a ban on government mandated encryption backdoors, something computer security experts have universally urged, she’s…
NBC News has a new article about Donald Trump’s doctor of 35 years, Dr. Harold Bornstein—the guy who claimed that Trump, if elected, would be “the healthiest individual ever elected to the presidency.” The dude looks like a character from a bad 70s porno flick, but Deadspin’s Tim Burke spotted something weirder: Dr.…
A kind of batshit insane and unprecedented thing has just happened in the world of ethical hacking.
It was going to happen soon enough: WhatsApp will now start sharing user data with the company that owns it, Facebook.
Ghostbusters star Leslie Jones has been hacked. Images seen by Gizmodo include multiple nude photographs of Jones, and photos that appear to show the star engaging in sexual acts. The leak also includes scans of her passport, as well as of her California driver’s license.
There’s a lot of misinformation about security online. The truth is that by taking a few simple steps you can make yourself much safer. Here are the basic, super easy ways to do it:
Not all emails are what they seem. Many messages come with embedded code designed to tell the sender when (and even where) you open them up. It’s a trick often used by marketing companies to work out if you’re actually paying any attention to them, but there are ways of spotting this kind of email tracking.
Do you think your data is safe because your computer isn’t connected to the internet or a network? Wrong. As security researchers recently demonstrated, the sounds of your computer’s hard drive can be used to transmit data from an air-gapped and seemingly well-protected machine.
Have you ever wondered why you don’t see people wearing Rolls Royce’s hood ornaments dangling from a necklace? It’s because the Spirit of Ecstasy, as the hood ornament is obnoxiously called, is protected by a brilliantly over-engineered mechanism that causes it to retract and disappear if tampered with.
According to a report by security blogger Brian Krebs, Oracle’s popular MICROS point-of-sale terminals support website was commandeered by a Russian cybergang. This is bad since MICROS is in the top three most popular payment systems in the world.
While Pokémon Go has proven itself massively popular (duh) all over the world, some countries aren’t getting in on the action, or haven’t yet. However, one country announced today that it won’t be participating at all.
Nowhere is the distinction between the haves and have-nots more apparent than when waiting for a flight at the airport. But it turns out you might not need an actual first class ticket to get into a swanky airport lounge—just a custom Android app that spits out a boarding pass-spoofing QR code.
What if humans didn’t have to respond to major hacks or breaches in the networks they operated, and computers could just do it automatically? That’s a question being asked by DARPA, the US military’s boldest research arm, which set up a multi-million dollar challenge to answer that question.
Isn’t the web a wonderful place for exploring? Just like any other appealing destination though, if you don’t keep yourself safe, the attraction quickly wears off. Thankfully, you don’t need a degree in advanced networking to protect yourself online—you just need to read and take heed of these 12 security tips, which…
Every day it seems like there’s another hack, password theft, or leak. Both government agencies and private companies are regularly attacked, by intruders just looking for sensitive data to sell, or foreign actors looking for valuable information. That alone is reason enough for a Presidential candidate to at least…
Two-factor authentication is one of the most important ways to protect your accounts. However, recently some authentication methods like SMS have come under fire for being vulnerable to hackers, which defeats the point of “something you know and something you have.” We decided to look at the most common methods and…
A newly discovered set of wireless keyboard vulnerabilities can let hachers take over your keyboard and secretly record what you type. It’s called KeySniffer, and it spells death for millions of wireless, radio-based keyboards.
You can get safes camouflaged as everything from water bottles to cans of shaving cream, but our new favorite way to protect your valuables might be this Nike shoebox strongbox that few intruders will even think to look inside—unless they’re really after a rare pair of Jordans.