Imagine downloading a NetFlix app to your phone so that you can watch movies on the go. You would expect the app to request your account's username and password the first time it runs, like most apps do.
Employing a mesh network configuration allows users to form their own networks without a centralized infrastructure - making them inherently resistant to censorship, surveillance and disruption.
The Electronic Frontier Foundation (EFF) has published the FBI’s drone licenses and supporting records for the last several years.
Almost half of the mobile apps running on Apple's iOS operating system access the unique identifier of the devices where they're downloaded, at least according to computer scientists at the University of California, San Diego.
We all know that Prism is most likely just the tip of the snooping iceberg. While some of us may run Tor on our PC or Mac, there may be times when when we are working on a device that is not our own, or perhaps even a Chromebook, tablet or phone.
Think your antivirus product is keeping your Android smartphone or tablet safe? Think again.
Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber-attacks on networked control systems – which are used to coordinate transportation, power and other infrastructure across the United States.
The results of a large-scale, analysis of BitTorrent file-sharing of computer games, focusing on using open methodologies are to be published in the International Journal of Advanced Media and Communication and bust some of the common myths about digital piracy.
Troops operating in forward locations without telecommunication infrastructure often rely on a mobile ad hoc network (MANET) to communicate and share data.
Viber can best be described as an Android messaging app designed to compete with Skype.
Online exchanges that trade hard currency for Bitcoin reportedly have a 45 percent chance of failing - often taking their customers’ money with them. The above-mentioned claim is based on a new computer science study that applied survival analysis to examine the factors that prompt Bitcoin currency exchanges to close.
Apple has confirmed that it keeps Siri-related data for up to two years after the information is anonymized.
Michigan State researchers have concluded that Twitter can easily teach people about social movements such as Occupy Wall Street - and even encourage them to participate.
Researchers at the University of California, Davis have determined that popular texting, messaging and microblog apps developed for the Android smartphone are hobbled by security flaws that could expose private information or allow forged fraudulent messages to be posted.
The US Navy has confirmed that it will be deploying a prototype laser weapon in the Persian Gulf.
Security researchers say they have positively identified a spam message campaign on Skype designed to spread malware with Bitcoin mining capabilities.
A number of prominent military officials believe cyber warfare is one of biggest threats the United States is facing today.
Cupertino has taken steps to bolster its security system for Apple ID accounts linked to popular services like iCloud and iTunes.
US intelligence officials have ranked the specter of cyber-attacks as a major threat on par with concerns over terrorism and North Korea.
Former US Secretary of State Colin Powell has had a few juicy things to say about ex-president George Bush over the last couple of days - or the person using his Facebook account has, at any rate.