This Map Tracks Where Governments Hack Activists and Reporters
A new collaborative software project maps cases of state-sponsored malware campaigns targeting civil society victims. The post This Map Tracks…
Aggregating the Future
A new collaborative software project maps cases of state-sponsored malware campaigns targeting civil society victims. The post This Map Tracks…
Researchers find cars’ internal networks collect enough data to quickly “fingerprint” drivers, with plenty of privacy-invasive or anti-theft applications. The…
Researchers in Kyoto demonstrate for WIRED how they can precisely track the locations of people using gay dating apps despite…
In Whatsapp’s footsteps, Google’s new apps finally adopt end-to-end encryption. The post With Allo and Duo, Google Finally Encrypts Conversations…
One of Bitcoin’s first coders describes Craig Wright’s private “proof” that he created the cryptocurrency, in contrast with his flimsy…
The nightmare scenario of the internet-connected smart home is real. The post Flaws in Samsung’s ‘Smart’ Home Let Hackers Unlock…
This decades-old form of web encryption is in the midst of an accelerating renaissance. The post Hacker Lexicon: What Is…
WhatsApp and Viber may have turned on “default” end-to-end encryption, but truly securing your messages requires a couple steps of…
A new system called Toosheh lets Iranians download a daily bundle of censored files to a USB plugged into their…
Montage, a new tool from Google’s Jigsaw tech incubator, is designed to help excavate, map, tag and sort YouTube evidence…