What can be done about the potential spyware in all of our pockets?
Government officials warn that software from Kaspersky Lab could be subverted by Russian intelligence. A security researcher shows how it could be done.
One of the most shocking parts of the recently discovered spying network Equation Group is its mysterious module designed to reprogram or reflash a computer hard drive’s firmware with malicious code. The Kaspersky researchers who uncovered this said its ability to subvert hard drive firmware—the guts of any computer—“surpasses anything else” they had ever seen. \[…\]
We live in the golden age of pocket gadgets. And as somebody who deeply loves these things, I’ve learned some valuable lessons about what you’ll really use and what’s destined for the junk drawer.
New tools help parents track their children’s internet activity, but it’s bad to install them without their knowledge.
Hackers already love them, which means spies will, too.
Google. Alexa. Siri. Is your smart device listening in on your conversations without you knowing?
Algorithms can now gather massive amounts of real-time data on every imaginable aspect of what you do all day.
A research paper details how headphones can be turned into microphones without the user realizing it.
Technology's neverending story has always, apparently, been the quest for The Next Big Thing. Whether that thing is something entirely new and transformative..
Malware is malicious software programs designed to harm systems, steal data, or spy on browsing behavior.
The inside story of the world’s most notorious commercial spyware and the big tech companies waging war against it.
One of the many reasons I love the Internet is the sheer number of resourceful tools that businesses have at their fingertips. Before the advent of the In
From your driver’s license to your house keys to your insurance cards—and everything in between
We can all use a little extra money in our pocket during the holidays. Our tech guru Jamey Tucker has some ideas where we might get some:
Multiple confidential documents obtained by Motherboard show the sort of companies that want to buy data derived from scraping the contents of your email inbox.
It can be difficult to admit but your competitors are better at some business activities than you are, but you shouldn’t view it as a bad thing; you can learn a lot from your competition. Healthy c…