Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
A guide to stingray surveillance technology, which may have been deployed at recent protests. → Read More
A December 4 runoff for the Secretary of State will help determine how the state handles controversial decisions around how to secure voting machines and when to purge voter rolls. → Read More
The Shadow Brokers leak showed the NSA was tracking at least 45 nation-state hacking operations. Experts explain how the agency stepped up its monitoring. → Read More
Secret NSA code was inadvertently uploaded to Moscow after its owner was infected by malware while bootlegging Microsoft Office, says Kaspersky Lab. → Read More
Kaspersky Lab's transparency project offers ongoing access. The company foils U.S. government hackers and was recently accused of helping the Kremlin. → Read More
Russian hackers got top-secret material via Moscow-based Kaspersky Lab. Intelligence sources and documents explain how it may have happened — without Kaspersky's knowledge. → Read More
Researchers call into question how online attacks are attributed as hackers increasingly steal tools from one another, obscuring their identities. → Read More
Ransomware is malware that locks your keyboard or computer to prevent you from accessing your data until you pay a ransom. → Read More
What really happened in 2001 when China brought down a U.S. military spy plane? A secret report from the Snowden archive provides details. → Read More
Rand Corp. analyzed of around 200 "zero days" sourced from a company that sells to governments. The attacks remained potent for 7 years on average. → Read More
WikiLeaks said CIA hackers impersonated foreign hackers. In fact, the files simply showed re-use of code — in ways that implicated no one else. → Read More
The FBI has rescinded an NSL issued earlier this year to the online library. It's the archive's second landmark victory over NSLs in 10 years. → Read More
Your call logs get sent to Apple's servers whenever iCloud is on — something Apple does not disclose. → Read More
Apple fights to keep the U.S. government out of its phones. Cellebrite is the leader in helping break in. An inside look at the secretive Israeli company. → Read More
And last night's episode had a few things that might benefit from some explanation. → Read More
The people who create the hacks on the hit TV show are just as obsessed with getting it right as viewers are. → Read More
Looking back at Season 1 gives us some ideas where Elliot's journey may go after the E Corp hack. → Read More
Companies can keep transferring data from the EU to their US servers under a new deal between the two governments that privacy advocates are decrying. → Read More
Pokémon Go no longer catches all your Google account info. → Read More
Just how does a bomb-defusing robot kill a human being? → Read More