An investigative reporter at heart, I write about technology, security, and online privacy. I also write about health and fitness. email@example.com
A security researcher with the firm Bishop Fox caught the app uploading emails and phone numbers right after it is first launched.
We've seen data theft, energy grid hacks, and Stuxnet, but not open cyberwar — yet.
Millions of Android users are running out-of-date software that leaves them vulnerable to a whole host of publicized security flaws.
No, it's not only you--some user interfaces intentionally want to confuse and enroll.
The horrors of the future, from nuclear proliferation to plagues, are on full display in Eclipse Phase.
Algorithmic tattoo identification for law enforcement could have all sorts of scary consequences.
Our writer set out to make a list of reliable VPNs; turns out the task is complicated.
One of the world's elite hacking teams.
A security vulnerability in the Mac version of Apple’s Messages app allowed users to be compromised by malicious links.
A round up of the mostly free and open source hacking tools used on the show.