
Malware Attacks Used by the U.S. Government Retain Potency for Many Years, New Evidence Indicates
Rand Corp. analyzed around 200 “zero days” sourced from a company that sells to governments. The attacks remained potent for seven years on average.
Rand Corp. analyzed around 200 “zero days” sourced from a company that sells to governments. The attacks remained potent for seven years on average.
WikiLeaks said CIA hackers impersonated foreign hackers. In fact, the files simply showed reuse of code — in ways that implicated no one else.
When the feds demanded the encryption key for Lavabit, the company shut down rather than comply. Now it’s set to relaunch.
The FBI has rescinded an NSL issued earlier this year to the online library. It's the archive's second landmark victory over NSLs in 10 years.
Your call logs get sent to Apple’s servers whenever iCloud is on — something Apple does not disclose.
Apple fights to keep the U.S. government out of its phones. Cellebrite is the leader in helping break in. An inside look at the secretive Israeli company.
Peiter "Mudge" Zatko and his wife Sarah, formerly of the NSA, developed software that's already helped find flaws across 12,000 pieces of software.
In 2011, Hungarian researchers found an exquisitely sophisticated virus. Its target: the infrastructure of trust that makes the internet work.