Spread the loveTweet Law enforcement’s use of the surveillance devices known as stingrays, fake cell towers that can intercept communications and track phones, remains as murky as it is controversial,…
Spread the loveTweet Over the past year, the Kremlin’s strategy of weaponizing leaks to meddle with democracies around the world has become increasingly clear, first in the US and more…
Spread the loveTweet After a hacked US election covered in Russian fingerprints, it’s easy to assume that Friday’s megaleak of emails from France’s president-elect Emmanuel Macron was the Kremlin’s work,…
Spread the loveTweet Ten days after US intelligence agencies pinned the breach of the Democratic National Committee last October on the Russian government, Vice President Joe Biden promised government would…
Spread the loveTweet When the cybersecurity industry warns of digital threats to the “internet of things,” the targets that come to mind are ill-conceived, insecure consumer products like hackable lightbulbs…
Spread the loveTweet When the cybersecurity industry warns of digital threats to the “internet of things,” the targets that come to mind are ill-conceived, insecure consumer products like hackable lightbulbs…
Spread the loveTweet For hackers, scanning for an open “port”—a responsive, potentially vulnerable internet connection on a potential victim’s machine—has long been one of the most basic ways to gain…
Spread the loveTweet For years, automakers and hackers have known about a clever attack that spoofs the signal from a wireless car key fob to open a vehicle’s doors, and…
Spread the loveTweet Julian Assange has made himself a difficult figure to love. The organization he created, WikiLeaks, has spilled secrets that infuriate the right and, more recently, the left…
Spread the loveTweet In an age of pervasive internet surveillance, traditional tools like email and phone calls are no longer enough to safely link reporters and their contacts. The most…