A new flaw allows any hands-on hacker to access iPhones and iPads where the user previously left off, including email, settings, and other apps.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
The U.S. government relies on intelligence from an unknown number of U.S. telecoms for its mass surveillance programs. What's the state of phone privacy in the post-NSA world?
Two of the seven are for at least one critical vulnerability. One of these affects an unusually broad collection of products.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
[UPDATED] Still cleaning up after the Heartbleed debacle, OpenSSL is issuing fixes for several vulnerabilities, one of them exploitable to run arbitrary code on the client or server.
Ten attacks on corporations and individuals by hackers and governments, and all of them could have been prevented if people had followed best practices.
Believe it or not, most states have some provisions for allowing people to vote over the Internet. The pressure is on to expand it, even though a secure online voting system is impossible using today's technology.
Nobody has a good explanation yet for what happened to the generally respected TrueCrypt project, which yesterday announced itself insecure and sent its users to Microsoft.
Microsoft myBulletins service on Technet allows a user to determine which software updates they should apply. We think it's likely useful only for small organizations and individuals.
Microsoft warns that using Windows POSReady patches on a regular Windows XP system could cause problems. How seriously should you take this?