The pursuit of lock picking is as old as the lock, which is itself as old as civilization. But in the entire history of the world, there was only one brief moment, lasting about 70 years, where you could put something under lock and key—a chest, a safe, your home—and have complete, unwavering certainty that no… »
On April 3rd, 581 days after a military court sentenced to Chelsea Manning to 35 years in prison for leaking some 750,000 classified documents, Chelsea Manning burst back into the public eye with a new Twitter account. What the hell is she trying to do? We talked to the people running her account to find out. »
Who knows where you are? According to a team of researchers from the National University of Singapore many websites could—using what they call a “geo-inference attack” to identify your location »
It’s tempting to view security breaches as the products of mastermind hackers, but a massive report released today reveals the sad reality. Most of the time, breaches are the result of people falling for plain old trick emails. »
As ambitious politicians announce their plans to run for president in 2016, you can be sure that cheeky hackers are gearing up for some good pranks. Who will they hit? Nobody can be sure, but a former developer for the Obama campaign just posted a side-by-side comparison of the security protections on the top four… »
When anti-Chinese censorship services got hit with a crippling distributed-denial-of-service attack last month, researchers quickly pegged China as the culprit. Now, Citizen Lab has pinpointed the Chinese tool that made this attack happen. They’re calling it the Great Cannon. »
Connecting a hard drive to your home network is a smart idea: it can let you access your files no matter where you are. But now it seems that, in some cases, Google has been indexing the private files held on such devices. »
Facebook is all well and good, but what's all this interaction about? Turn your back for five seconds and your so-called friends are tagging you in dubious nightspots or posting Rick Astley music videos to your timeline. A quick delve into the security settings for your account can stop this behavior and help you… »
A security camera is a useful tool for providing evidence when something obvious happens in your home, but what’s happening during all the other hours it records that you simply don’t have time to watch every night? FLIR’s new FX Wi-Fi camera uses intelligent motion tracking to create a simultaneous replay of… »
If you don’t already have two-step authentication enabled on your all your account, you really need to turn it on for anything sensitive. Here’s how.
Over the past few weeks, China has been using its country’s Internet infrastructure to attack political opponents by turning normal users’ web browsers into Denial of Service tools.
Installing a custom firmware on your Wi-Fi router is like God Mode for your home network. You can see everything going on, boost your Wi-Fi signal, beef up your security, and even do advanced tricks like install your own VPN. Still, there are so many options available it can be tough to pick the right one. Here’s… »
Hillary Clinton told the world that the reason she exclusively used her personal email as Secretary of State because she “wanted the simplicity of using one device.” But thanks to a FOIA request, we now know that Clinton used multiple devices for email, including an iPad and a BlackBerry. She also mixed her personal… »