For want of a VPN, Guccifer 2.0 was lost
Your old router could be a hacking group’s APT pawn
China evaluates vulnerabilities for attacks before disclosure
How antivirus software could be used for government espionage
Could strong encryption and backdoors coexist? Nope, experts say