For people worried about identity theft and privacy, the discovery by Hold Security of a giant database of stolen data is highly personal. But there are steps everyone can take to minimize the hackers’ impact.
Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t \[…\]
BitTorrent Inc., the company behind the popular file-sharing client uTorrent , unveiled its serverless chat client today. BitTorrent Bleep allows users to communicate via text or voice, fully encrypted and without the need for central servers.
'Signal' for iOS Lets Users Make Encrypted Voice Calls for Free
Open source software group Open Whisper Systems today released a new encrypted phone app called Signal, which is designed to allow its users to make...
How to better protect your iPhone and iPad against 'backdoors' and other se
Security and convenience are perpetually at war. There will always be errors, compromises, and oversights that put our privacy at risk. Old ones will get fixed but new ones will get discovered. So wha
Leave your ring of cut-brass secrets unattended on your desk at work, at a bar table while you buy another round, or in a hotel room, and any stranger---or friend---can upload your keys to their online collection.
EFF unveils secure, sharing-friendly, privacy-minded router OS
As promised, the Open Wireless Movement's new sharing-friendly, privacy-minded router operating system was unveiled at HOPE X in New York last weekend. The OS, a joint project of Electronic Frontier…
LIVE: Detention Lift Hearings For Assange, Stockholm District Court
At 13:00 July 16, hearings were held in the Stockholm District Court whether to lift the almost-four-year-old detention in absentia for Julian Assange. This...
Bring-Your-Own-Encryption: Is It the Right Choice for Your Enterprise?
Experts warn that there are some aspects that need to be take into consideration before making the move to Bring-Your-Own-Encryption (BYOE) and managing encryption keys to protect data.
Active Directory Vulnerability Disclosure: Weak encryption Enables Attacker
URGENT News! 🚨 Your Active Directory Vulnerability may be at RISK! Discover TOP 5 Critical Fixes NOW! Secure Your Data before it's TOO LATE! 💼🔒 Click to LEARN HOW!
The American Bar Association has released a detailed white paper advising the Government on how to tackle online piracy. The lawyers recommend several SOPA-like anti-piracy measures including injunctions against companies hosting pirate sites. At the same time, however, they advise against suing file-sharers as that would be ineffective or even counterproductive.
C.D.C. Closes Anthrax and Flu Labs After Accidents
After potentially serious accidents involving bird flu and live anthrax, the Centers for Disease Control and Prevention shut the Atlanta labs and halted shipments of infectious agents.