Personal security in a hacked world
Suffering a data breach is like discovering that someone rummaged through your bag when you weren’t looking. It’s a jarring…
The president-elect’s attacks on the press hint at an unfriendly atmosphere for reporters.
We built a fake web toaster, and it was compromised in an hour.
This is how hackers play capture the flag.
… and Spotify, and Github, and The New York Times
A team of workers at the Department of Homeland Security gives companies advice on protecting themselves from attacks.
Suspected foreign interference in an American election might be a taste of what's to come.
There’s a gaping security hole in eight popular models.
The people who most need privacy often can’t afford the smartphones that provide it.
The agency now says that a total of 724,000 people may have had their personal information stolen by hackers.
A cyberattack in Los Angeles has left doctors locked out of patient records for more than a week. Unless the medical facility pays a ransom, it’s unclear that they'll get that information back.
Companies are paying “white hat” hackers to probe their cybersecurity systems for weaknesses—but some say that so far, they aren’t paying enough.
The doxing of Ashley Madison reveals an uncomfortable truth: In the age of cloud computing, everyone is vulnerable.
"Everybody's data is at risk and vulnerable, and has probably been compromised multiple times, if they're an adult."
How a tense exchange between the NSA director and a Yahoo executive reveals the rift between D.C. and Silicon Valley
Welcome to a world where it's impossible to tell the difference between random hackers and governments.
Or the thousands of less famous women who've been victimized.
As email, documents, and almost every aspect of our professional and personal lives moves onto the “cloud”—remote servers we rely on to store, guard, and make available all of our data whenever and from wherever we want them, all the time and into eternity—a brush with disaster reminds the author and his wife just how vulnerable those data can be. A trip to the inner fortress of Gmail, where Google developers recovered six years’ worth of hacked and deleted e‑mail, provides specific advice on protecting and backing up data now—and gives a picture both consoling and unsettling of the vulnerabilities we can all expect to face in the future.
When will China emerge as a military threat to the U.S.? In most respects the answer is: not anytime soon—China doesn’t even contemplate a time it might challenge America directly. But one significant threat already exists: cyberwar. Attacks—not just from China but from Russia and elsewhere—on America’s electronic networks cost millions of dollars and could in the extreme cause the collapse of financial life, the halt of most manufacturing systems, and the evaporation of all the data and knowledge stored on the Internet.