In Hong Kong, Which Side Is Technology On?

Credit to Author: Zeynep Tufekci| Date: Tue, 22 Oct 2019 10:00:00 +0000
Both. Yes, authoritarians have co-opted tech. But the story is far from over.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Zeynep Tufekci| Date: Tue, 22 Oct 2019 10:00:00 +0000
Both. Yes, authoritarians have co-opted tech. But the story is far from over.
Read More
Credit to Author: Scott Gilbertson| Date: Tue, 22 Oct 2019 10:00:00 +0000
Your brain has better things to do than store secure passwords. Get a dedicated password manager to keep your login data synced and secure across all devices.
Read More_1173914200.jpg)
Credit to Author: Andy Greenberg| Date: Mon, 21 Oct 2019 21:51:53 +0000
Most hackers know how to cover their tracks. But Russia’s elite groups are working at a whole other level.
Read More
Credit to Author: Lily Hay Newman| Date: Mon, 21 Oct 2019 15:00:00 +0000
The “secured-core PC” feature for Windows looks to head off firmware hacks.
Read More
Credit to Author: David Nield| Date: Sun, 20 Oct 2019 11:00:00 +0000
Whether it’s Facebook, Instagram, Twitter, or Snapchat, lock down who can see what you’re up to.
Read More.jpg)
Credit to Author: Brian Barrett| Date: Sat, 19 Oct 2019 12:00:00 +0000
A Samsung Galaxy 10 fingerprint goof, a Tor impostor, and more of the week’s top security news.
Read More
Credit to Author: Matt Laslo| Date: Sat, 19 Oct 2019 12:00:00 +0000
As data hijackers continue to target local governments and hospitals, legislators remain stymied over how best to address the problem.
Read More
Credit to Author: Louise Matsakis| Date: Sat, 19 Oct 2019 11:00:00 +0000
Fried onion meets 1984.
Read More