Security experts worry that U.S. charges against WikiLeaks publisher Assange could scare whistleblowers—or cloud the nature of his relationships with Russia and Trump associates.
At the Web Summit, CrowdStrike CEO George Kurtz shares his sharp perspectives on political-hacking topics ranging from chatbot-seeking AI to security-inept campaign volunteers.
At the HOPE hacker conference, a talk about turning oxycodone into its overdose antidote prompts a broader look at the expanding definition—and increasing relevance—of biohacking.
Two decades after presenting at the Senate’s first cybersecurity hearing, veteran L0pht hackers Kingpin, Mudge, Weld Pond, and Space Rogue reflect on progress and urge for much more.
The point of the Bishop Fox Cybersecurity Style Guide, its editor says, is to “bridge the gap between people who are writing in security, and the people who have to read that.”
As sexual-misconduct allegations across industries proliferate, many organizations, including hacker conferences such as CCC, are realizing that they need a better conflict resolution protocol.
The sexual advances of the infamous John T. Draper, Captain Crunch, on young men in the hacker community—”inappropriate…and awkward,” sources say—were uninvited and unwelcome.
At Bitcoin Cafe in Prague, on the first floor of a hacker haven, you can buy a brew only with bitcoin or litecoin. We sat down with a Paralelní Polis board member to learn how—and why.
Hacker group claiming to have millions of valid Apple log-ins and demanding $75,000 underscores risks of credential stuffing.
Aiden Riley “Caezar” Eller, longtime CTO of Unium, explains how he’s working “to get the home network to be a meeting place for devices to all have an equal level of responsibility.”
Machine learning, enabled by finely tuned algorithms and a plethora of data, "artificial intelligence" is quickly growing in influence among security professionals, cybercrime rings, and data-probing government agencies. Here’s how.
At hacking contests like Pwn2Own, individual hackers can shine. Participating companies, meanwhile, can find and recruit badly needed talent, as they build hacker-friendly reputations.
In a keynote speech at the ShmooCon hacker conference, computer security pioneer Gary McGraw relates seven quotes from the rock and literary icons to people working in his industry.
Like other types of programs, antivirus software sometimes is vulnerable itself. And unlike others, it can hook into the core of your computer. Here’s why experts say you should still use it.
As people and organizations pay larger sums to free their computers of the malware, The Parallax looks into what’s driving ransomware’s development—and where it’s spreading.