Claim - this feature stops apps from stealing phone users' passwords

Imagine downloading a NetFlix app to your phone so that you can watch movies on the go. You would expect the app to request your account's username and password the first time it runs, like most apps do.

Shielding mesh networks from prying government eyes

Employing a mesh network configuration allows users to form their own networks without a centralized infrastructure - making them inherently resistant to censorship, surveillance and disruption.

Drone surveillance - FBI style

The Electronic Frontier Foundation (EFF) has published the FBI’s drone licenses and supporting records for the last several years.

Are iOS apps accessing your private data?

Almost half of the mobile apps running on Apple's iOS operating system access the unique identifier of the devices where they're downloaded, at least according to computer scientists at the University of California, San Diego.

How to turn a Raspberry Pi into a portable Tor proxy (Onion Pi)

We all know that Prism is most likely just the tip of the snooping iceberg. While some of us may run Tor on our PC or Mac, there may be times when when we are working on a device that is not our own, or perhaps even a Chromebook, tablet or phone.

Report: Android antivirus apps are less-than-stellar

Think your antivirus product is keeping your Android smartphone or tablet safe? Think again.

Algorithm detects and isolates cyber-attacks

Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber-attacks on networked control systems – which are used to coordinate transportation, power and other infrastructure across the United States.

Busting digital piracy myths

The results of a large-scale, analysis of BitTorrent file-sharing of computer games, focusing on using open methodologies are to be published in the International Journal of Advanced Media and Communication and bust some of the common myths about digital piracy.

Pentagon wants to evolve mobile ad hoc networks (MANETS)

Troops operating in forward locations without telecommunication infrastructure often rely on a mobile ad hoc network (MANET) to communicate and share data.

Claim: Bitcoin exchanges less likely to fail, but more likely to suffer breach

Online exchanges that trade hard currency for Bitcoin reportedly have a 45 percent chance of failing - often taking their customers’ money with them. The above-mentioned claim is based on a new computer science study that applied survival analysis to examine the factors that prompt Bitcoin currency exchanges to close.

Apple keeps Siri data for two years

Apple has confirmed that it keeps Siri-related data for up to two years after the information is anonymized.

Can Twitter help empower the masses?

Michigan State researchers have concluded that Twitter can easily teach people about social movements such as Occupy Wall Street - and even encourage them to participate.

Security vulnerabilities found in Android apps

Researchers at the University of California, Davis have determined that popular texting, messaging and microblog apps developed for the Android smartphone are hobbled by security flaws that could expose private information or allow forged fraudulent messages to be posted.

Video: US Navy deploys laser weapon in Persian Gulf

The US Navy has confirmed that it will be deploying a prototype laser weapon in the Persian Gulf.

Report: Bitcoin mining malware spreads on Skype

Security researchers say they have positively identified a spam message campaign on Skype designed to spread malware with Bitcoin mining capabilities.

Apple adopts two-step security verification

Cupertino has taken steps to bolster its security system for Apple ID accounts linked to popular services like iCloud and iTunes.

US Intelligence officials outline cyber threat

US intelligence officials have ranked the specter of cyber-attacks as a major threat on par with concerns over terrorism and North Korea.

Google's Chrome OS remains locked down and secure

Google's rapidly evolving web-centric Chrome OS managed to stave off hordes of hackers this past weekend at Mountain View's Pwnium (3) hack event.

Bradley Manning pleads guilty in WikiLeaks case

Pfc. Bradley Manning has pleaded guilty to leaking thousands of pages of classified documents and videos to the whistle-blowing WikiLeaks website.

How the FBI tracked Internet activist Aaron Swartz

A blogger has managed to obtain and publish once-classified FBI files that describe how the federal agency tracked and collected information about Internet activist Aaron Swartz.