On May 14th, 2015 with 40 comments
fliptop writes:Touting the technology as a replacement for IDs, part of your...
On May 15th, 2015 with 44 comments
takyon writes:Steven Aftergood at the Secrecy News blog is reporting that the...
On May 16th, 2015 with 22 comments
kaszz writes:Spying software maker mSpy sells their offerings as a service...
On May 16th, 2015 with 33 comments
fliptop writes:Claiming it's because there's no poles to mount them on, the...
On May 17th, 2015 with 7 comments
CortoMaltese writes:According to The Cryptosphere, An email server belonging...
On May 18th, 2015 with 24 comments
n1 writes:Ars Technica reports:The UK government has quietly passed new...
On May 19th, 2015 with 28 comments
melikamp writes: UK Royal Navy "Trident" nuclear weapons submariner William...
On May 20th, 2015 with 27 comments
AnonTechie writes:A law requiring the mass installation of spyware on...
On May 21st, 2015 with 24 comments
kaszz writes:There's a new TLS protocol security vulnerability found that can...
On May 21st, 2015 with 35 comments
frojack writes:Robots.txt files are simple text files that website owners put...
On May 22nd, 2015 with 20 comments
An Anonymous Coward writes:According to a story at the Intercept, the National...
On May 22nd, 2015 with 15 comments
kaszz writes:According to Daniel Mathews a lecturer in mathematics and...
On May 27th, 2015 with 20 comments
kaszz writes:For the first time, DNS redirection attacks against small office...
On May 27th, 2015 with 21 comments
frojack writes:Many news outlets seem to be carrying this story:Sophisticated...
On May 30th, 2015 with 3 comments
GlennC writes:The US website Motherboard reported two months ago that...
On May 31st, 2015 with 26 comments
takyon writes:Prof. Kim Heung-Kwang has told BBC Click that North Korea has...
On June 1st, 2015 with 13 comments
AnonTechie writes:A precision digital weapon reportedly created by the US and...
On June 2nd, 2015 with 18 comments
n1 writes:Ars Technica reports:Macs older than a year are vulnerable to...
On June 4th, 2015 with 21 comments
kaszz writes:Home and small-office routers is a hot target for security...
On June 4th, 2015 with 26 comments
AnonTechie writes:THE NATIONAL SECURITY Agency knows Edward Snowden disclosed...
On June 6th, 2015 with 16 comments
takyon writes:The Intercept's Micah Lee wrote a guide explaining how to...
On June 6th, 2015 with 17 comments
takyon writes:The brain's reaction to certain words could be used to replace...
On June 7th, 2015 with 15 comments
takyon writes:A former Australian Federal Police counter-terrorism officer has...
On June 8th, 2015 with 38 comments
Apple is Having its Microsoft Moment ticho writes:Faulty code is found in every...
On June 9th, 2015 with 8 comments
AnonTechie writes: The New York Times has published an interesting article...
On June 10th, 2015 with 12 comments
takyon writes:The White House Office of Management and Budget (OMB) has issued...
On June 11th, 2015 with 12 comments
n1 writes:The BBC reports:One of the leading anti-virus software providers has...
On June 11th, 2015 with 7 comments
darkfeline writes:A security researcher has published attack code he said...
On June 13th, 2015 with 47 comments
sudo rm -rf writes:Amongst other news outlets, CIO reports on a hacker attack...
On June 13th, 2015 with 35 comments
Phoenix666 writes with an interesting anecdote posted on Ars Technica:We put a...