Cybersecurity
Smartphone Encryption is a Luxury
The people that most need privacy often can’t afford the smartphones that provide it.
Emerging Tech
How One Programmer Broke the Internet by Deleting a Tiny Piece of Code
Writing software for the Web has become dependent on a patchwork of code that itself relies on the benevolence of fellow programmers.
Cybersecurity
Hackers Manipulate Water Treatment Operations, Invade Adele’s Privacy, and Plunder Diamonds on the High Seas
Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.
Cybersecurity
What Happens When You Click on That Fox News ‘Trump Quits’ Video?
Clicking on the video may not corrupt your computer, but the sender does want your money.
Cybersecurity
Hacktivists Mess with Chemicals in Water Treatment Plant
Other Critical Infrastructure
Cybersecurity
Hackers Tipoff Pirates to Ship’s Precious Cargo and Coordinates
Transportation // Middle East
Cybersecurity
Miscreant Publishes Hacked Photos of Adele's Son, Including a Baby Scan
Entertainment // Social Media // UK
Digital Government
Why the Military Can’t Go After Iran for Hacking Your Dam
Seven Iranians have been charged with cyber crimes in a case that reveals the limits of U.S. power.
Digital Government
The Dark Web Is Too Slow and Annoying for Terrorists to Even Bother With, Experts Say
So why aren’t jihadis taking advantage of running Dark Web sites?
Cybersecurity
NIST is looking for a few good cryptographers
NIST's Computer Security Division wants to hire 15 cryptographers over the next five years to tackle emerging areas such as quantum and lightweight cryptography.
Cybersecurity