Tapping into laptop webcams shows the biggest and most blatant lack of respect for people's privacy by Western governments -- probably in living memory.
"The good news is, there is no [government] program named The Dick Pic Program," said Edward Snowden. "The bad news is they are still collecting everybody's information, including your dick pics." The post On John Oliver, Edward Snowden Says Keep Taking Dick Pics appeared first on WIRED.
In the next few months, Congressman Steve Israel plans to reintroduce legislation that would ban 3-D printed guns or any other fully-plastic firearm. The post Bill to Ban Undetectable 3-D Printed Guns Is Coming Back appeared first on WIRED.
A new executive order is said to have made it illegal to donate to Edward Snowden's fund, which didn't go down so well with one good-spirited community.
A collection of notable security news items for the week ending April 3, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
The Tor router runs on the same hardware as the failed Anonabox project, but with a more "honest" approach. The trouble is: honesty won't keep your Internet activity private.
First footage to finally be unveiled Film batman vs superman ben affleck Mad Max Fury Road
The allegation that the Silk Road’s Dread Pirate Roberts attempted to pay for six murders has loomed over the story of that massive online drug market. How could the pseudonymous figure preaching non-violent, libertarian ideals stoop...Show More Summary
The order is aimed primarily at state-sponsored actors and other hackers who are beyond the reach of law enforcement or diplomatic efforts. The post New Obama Order Allows Sanctions Against Foreign Hackers appeared first on WIRED.
Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. Current emergence of open source log search tools, BTW, does not break the logic of that post. Show More Summary
The code-sharing website is back up and running after a week-long attack crippled its services. The attack was blamed on Beijing, an allegation it didn't actually deny.
The security researcher sadly did not wipe out years of videos by Justin Bieber, leaving the world in the horrid, uncultured state that it is.
The top-of-the-line Blackphones are said to be "NSA-proof," despite the FBI's new policy that demonizes encryption as a "huge problem" for law enforcement.
The actor will leave his best known role in the next Wolverine solo film Film Hugh Jackman Wolverine X-Men X-Men Apocaylpse
Why not? Film Andy Serkis Avengers Age of Ultron Star Wars The Force Awakens
Symantec says a new Trojan-based campaign, focused on the Middle East, is targeting the energy industry and its trade secrets.
DDoS attacks are not only a disruption but can also cost businesses dearly, according to Neustar research.
This article proposes that commercial cyber intelligence products have multiple flaws which make it unreliable for use by the U.S. government, and that it falls upon the government to address those flaws in the following ways: Examine cyber threat intelligence for indicators of deception. Show More Summary
There has been a lot of talk about Hillary Clinton’s missing emails. After turning over thousands of emails, Clinton wiped the hard drive on her personal server. Mobile Hillary Clinton emails wiping
Nearly 18 months after the Silk Road online drug market was busted by law enforcement, the criminal charges rippling out from the case have now come full circle: back to two of the law enforcement agents involved in the investigation,...Show More Summary