A San Jose middle-school teacher angry at a newspaper’s characterization of her students’ potential recruits the Silicon Valley tech giant to help them succeed.
In its case against Apple, the federal agency claims that it’s trying to unlock just one phone. Far more is at stake, domestically and internationally, experts and activists say.
A hacker equipped with a $15 dongle and 15 lines of code can exploit the vulnerability to connect to, spy on, and control a computer using it, a Bastille security researcher says.
Apple is defying a court order to circumvent its mobile encryption. The use of a cheap remote-management app—including Apple’s own MDM—could have rendered the issue moot.
Google’s massively popular Android operating system powers billions of phones and tablets around the world, but it’s also far easier for hackers to infiltrate than Apple’s iPhones. Here’s why.
At ShmooCon in D.C., privacy advocate Jessy Irwin sits down with The Parallax to explain why security companies need to better know and communicate with their audiences.
Even in assured defeat, competing in chess against the longstanding top player in the world is a privilege. It is also an experience in learning the value of adaptability.
Chess grandmaster Garry Kasparov takes a break from opposing Vladimir Putin’s policies to talk with The Parallax about human rights, government spying, and privacy tools.
When your account gets hacked, you may feel as if your best online connection to friends has been shattered. Here’s how you get back to normal—and prevent another attack.
How private your mobile communications are depends on which devices you use and which apps you’ve installed. These apps can help keep your private messages from going public.
Why are U.S. government representatives demanding legal access to coded phone calls and text messages? Federal cybersecurity contractor Jan Filsinger says they lack cyber savvy.
With customers worldwide who would be negatively impacted by weakened encryption, Silicon Valley has an obvious interest in uniting together against a very dumb idea.
Tech leaders, security experts, and privacy advocates say law enforcement officials’ proposed backdoors and forced decryption would be ineffective and dangerous. Here’s why.
Law enforcement wants access to encrypted communications. Creating so-called backdoors could bring with it unintended consequences, including threats to personal privacy.
Hardly a modern invention, encryption has been in use for almost 4,000 years. Take a brief journey through history as we highlight some of the seminal moments in the development of coded communications.
Security researcher Marie Moe has a personal and potentially dangerous connection to the Internet: Following a medical emergency, Moe was outfitted with a pacemaker, in which she has discovered cybersecurity vulnerabilities, she reveals at hacker conference CCC.
Shari Steele has been on the job as the executive director of the anonymizing network Tor for three weeks. She has some big goals for the small organization—including locking down funding.
Internet-connected toys are just as vulnerable to hacks as the rest of the Internet of Things. Experts worry that toymakers aren’t taking their claims seriously.
Proponents say it could greatly benefit marketing, personal productivity, and public-safety endeavors. Privacy watchdogs are concerned that people will misuse it in horrifying ways.
The Data Security and Breach Notification Act and the Data Security Act would pre-empt arguably stronger state laws and strip the FCC of authority over data security enforcement.
While Adobe Systems is making changes to better support HTML5, the animation standard isn’t about to replace its security hole-hampered software, as long predicted would happen.
Makers of the Internet of Things devices say they’re now taking security seriously, but researchers say that’s just not true—and it’s going to be a while before it is.