Give gifts this holiday season that inspire your favorite hackers to make something great. Our ten top picks for gifts to make 'em smile are perfect for hackers of all styles, ages and interests.
Spotflux provides an easy to use solution to stay anonymous online and to protect your privacy and security. This small and easy to...
Intel suggests wearable devices could be the game changer and final death blow to passwords we've all been seeking.
UPDATED. A vulnerability in Samsung mobile devices which placed social networking accounts has been patched -- finally.
Security researchers working for the CIA have been poking holes in Apple security as part of a multi-year campaign.
The main advantage compared to other anonymous Web browsers is that xB Browser requires no configuration or technical knowledge in...
Superfish isn't just adware -- it can also be a nightmare for those who value their privacy.
As we seek new security solutions, what should app developers working in the burgeoning field of biometric security keep in mind?
Real Hide IP is privacy software which allows you to conceal your IP address, choose IP country and surf anonymously. It can protect...
The social media giant has pledged thousands to assist in the development of the open-source security project.
Not all buzzwords are bad. Some actually convey an idea, a concept, or a valid technology. However, some exist to confuse, distort, and empower those who don't want you to know what they're talking about.
New log-in options designed to provide anonymity, privacy
The best part about the retail sector is that it combines four fun areas: Business, technology, and human behavior and psychology. Here's a tour of what may be coming to a store near you.
After being hacked by Anonymous, AAPT has been found to be in breach of two sections of the Australian Privacy Act.
One of America's most respected security researchers discloses that the U.S. Government's data security practices are shockingly negligent. This is what CISPA supporters don't want us to know.
The chief developer of the popular alternative Android firmware CyanogenMod thought that requiring devices to report unique smartphone and tablet data would be an unqualified blessing. They reckoned without their users.
Cybercrime, cyberespionage, and straight out cyberattacks will increase in both frequency and ferocity over the next 12 months. Here are some of the challenges we're going to be dealing with.
Yes, it's Halloween season of 2012, and we're here to revisit the technologies that are so frightening, they'll make you evacuate from multiple "interfaces".
The Pirate Bay, used by millions worldwide to file-share copyrighted content and free-for-all works alike, is accused of collecting IP addresses of its registered users.
Another temporary restraining order against the country's Cybercrime Prevention Act has been filed, as Filipinos protest against its vague definition of online libel and violation of personal rights.
The FBI is claiming that it has nothing to do with the leaked list of over a million Apple device IDs, because it never had the information to begin with.
Wikileaks' latest trove of leaked Stratfor emails details the breadth and potential impact of the TrapWire surveillance system. What is it, and are you affected?