u
5
d
The social media transition of power has been a bit bumpy.
u
4
d
IBM's confidential "WindsorGreen" was detailed in documents exposed via an apparent backup drive.
u
4
d
Opinion: Journalists must embrace encryption to protect themselves and their sources.
u
4
d
If you’re interested in creative code, the crypto world can be a real buzzkill. Figured out a new way to exchange keys? Sorry, you’re better off using this protocol from the 70s. At least we know...
u
4
d
WikiLeaks has published a new set of documents that shed light on the CIA’s hacking capabilities. Dubbed "Vault7," the publication contains 8,761 documents and files purportedly taken from a secure...
u
4
d
Despite some initial confusion, the CIA hasn't undermined Signal and other important end-to-end encrypted apps.
u
4
d
Algorithm underpinning Internet security falls to first-known collision attack.
u
4
d
Earlier this week, my colleague Chaim Gartenberg covered a laptop called the GPD Pocket, which is currently being funded on Indiegogo. As Chaim pointed out, the Pocket’s main advantage is its size...
u
4
d
Facebook used to repeat its mission statement so often that most tech reporters could recite it from memory: "To give people the power to share and make the world more open and connected." And it’s...
u
4
d
Besides bad hair, pleated jeans, and 21 Jump Street, the ‘80s brought us a remarkable technological revolution. Nintendo changed the living room forever with the introduction of the NES in 1985. IBM,…
u
4
d
This new device turns many devices, many remotes, many apps, into one.
u
4
d
Microsoft is planning to refresh its Windows 10 user interface in an update later this year, and the software maker has briefly started teasing what’s on the way. Windows Central reports that...