The CIA Sets Up Shop on Tor, the Anonymous Internet

Credit to Author: Lily Hay Newman| Date: Tue, 07 May 2019 14:06:25 +0000
Even the Central Intelligence Agency has a so-called onion service now.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Lily Hay Newman| Date: Tue, 07 May 2019 14:06:25 +0000
Even the Central Intelligence Agency has a so-called onion service now.
Read More
Credit to Author: Tor Ekeland| Date: Tue, 07 May 2019 13:00:00 +0000
Opinion: Julian Assange is being prosecuted under the Computer Fraud and Abuse Act, a minimally defined statute that can have maximally destructive consequences.
Read More
Credit to Author: Andy Greenberg| Date: Tue, 07 May 2019 06:15:59 +0000
How a “secret” hackable bug found by the NSA was used over by Chinese, North Korean, and Russian hackers to wreak havoc.
Read More
Credit to Author: Lily Hay Newman| Date: Mon, 06 May 2019 20:43:00 +0000
On Sunday, Israeli forces bombed a building that allegedly housed an active Hamas hacking group—a potential first for cyberwar.
Read More![]()
Credit to Author: Lily Hay Newman| Date: Sun, 05 May 2019 11:00:00 +0000
Security firms are increasingly touting application shielding as an important layer of defense. But it may be better suited to DRM.
Read More
Credit to Author: Emily Dreyfuss| Date: Sat, 04 May 2019 13:00:00 +0000
Hacking big companies, building a better voting machine, and more security news this week.
Read More
Credit to Author: Alex Baker-Whitcomb| Date: Fri, 03 May 2019 23:10:03 +0000
Catch up on the most important news today in 2 minutes or less.
Read More
Credit to Author: Andy Greenberg| Date: Fri, 03 May 2019 11:00:00 +0000
A group of likely Chinese hackers has poisoned the software of at least six companies in just the last three years.
Read More