Following Apple, Amazon, and others, Google will put in new safeguards against accidental voice assistant collection and transcription.
Your iPhone just got a major security upgrade. Here are all the ins and outs.
Book excerpt: As a systems administrator, the young man who would expose vast, secret US surveillance saw freedom being encroached and decided he had to act.
Opinion: Red Flag laws help prevent suicides and mass shootings, and buy time for people in crisis to get help.
The Saudi oil strike, a license plate privacy disaster, and more of the week's top security news.
Beating back the scourge of online ad tracking entirely is almost impossible. But you can futz with your smartphone's "ad ID" to slow it down.
The new wave of attacks comes after a previous Click2Gov hack compromised 300,000 payment cards.
An international cybersecurity group has evicted the Chinese telecom company to comply with US sanctions. That could allow malware to spread more easily.
New research shows that over 2,000 streaming apps track information about your devices—even when you tell them not to.
By exploiting the WS-Discovery protocol, a new breed of DDoS attack can get a huge rate of return.
Google Project Zero found and reported a flaw in the widely used password manager.
At the Defcon hacking conference next year, the Air Force will bring a satellite for fun and glory.
Karen Navarra was a quiet woman in her sixties who lived alone. She was found beaten to death. The neighbors didn't see anything. But her Fitbit did.
In a new memoir and interview, the world’s most famous whistle-blower elucidates as never before why he stood up to mass surveillance—and his love for an internet that no longer exists.
White house spying, North Korea sanctions, and more of the week's top security news.
How do you make blockchain and other transactions truly private? With mathematical models known as zero-knowledge proofs.
With the departure of John Bolton from the White House this week, even the former national security advisor’s biggest critics are worried.
A fresh look at the 2016 blackout in Ukraine suggests that the cyberattack behind it was intended to cause far more damage.
Connected devices are more secure than ever. That's still not nearly enough.
The most sweeping takedown yet of so-called BEC scammers involved arrests in nearly a dozen countries.