Drone surveillance - FBI style

The Electronic Frontier Foundation (EFF) has published the FBI’s drone licenses and supporting records for the last several years.

Are iOS apps accessing your private data?

Almost half of the mobile apps running on Apple's iOS operating system access the unique identifier of the devices where they're downloaded, at least according to computer scientists at the University of California, San Diego.

How to turn a Raspberry Pi into a portable Tor proxy (Onion Pi)

We all know that Prism is most likely just the tip of the snooping iceberg. While some of us may run Tor on our PC or Mac, there may be times when when we are working on a device that is not our own, or perhaps even a Chromebook, tablet or phone.

Report: Android antivirus apps are less-than-stellar

Think your antivirus product is keeping your Android smartphone or tablet safe? Think again.

Algorithm detects and isolates cyber-attacks

Researchers from North Carolina State University have developed a software algorithm that detects and isolates cyber-attacks on networked control systems – which are used to coordinate transportation, power and other infrastructure across the United States.

Busting digital piracy myths

The results of a large-scale, analysis of BitTorrent file-sharing of computer games, focusing on using open methodologies are to be published in the International Journal of Advanced Media and Communication and bust some of the common myths about digital piracy.

Pentagon wants to evolve mobile ad hoc networks (MANETS)

Troops operating in forward locations without telecommunication infrastructure often rely on a mobile ad hoc network (MANET) to communicate and share data.

Report: Viber Android app exploit allows lock-screen bypass

Viber can best be described as an Android messaging app designed to compete with Skype.

Claim: Bitcoin exchanges less likely to fail, but more likely to suffer breach

Online exchanges that trade hard currency for Bitcoin reportedly have a 45 percent chance of failing - often taking their customers’ money with them. The above-mentioned claim is based on a new computer science study that applied survival analysis to examine the factors that prompt Bitcoin currency exchanges to close.

Apple keeps Siri data for two years

Apple has confirmed that it keeps Siri-related data for up to two years after the information is anonymized.

Can Twitter help empower the masses?

Michigan State researchers have concluded that Twitter can easily teach people about social movements such as Occupy Wall Street - and even encourage them to participate.

Security vulnerabilities found in Android apps

Researchers at the University of California, Davis have determined that popular texting, messaging and microblog apps developed for the Android smartphone are hobbled by security flaws that could expose private information or allow forged fraudulent messages to be posted.

Video: US Navy deploys laser weapon in Persian Gulf

The US Navy has confirmed that it will be deploying a prototype laser weapon in the Persian Gulf.

Report: Bitcoin mining malware spreads on Skype

Security researchers say they have positively identified a spam message campaign on Skype designed to spread malware with Bitcoin mining capabilities.

NATO's Tallinn Manual outlines rules for cyber-warfare

A number of prominent military officials believe cyber warfare is one of biggest threats  the United States is facing today.

Apple adopts two-step security verification

Cupertino has taken steps to bolster its security system for Apple ID accounts linked to popular services like iCloud and iTunes.

US Intelligence officials outline cyber threat

US intelligence officials have ranked the specter of cyber-attacks as a major threat on par with concerns over terrorism and North Korea.

Colin Powell's Facebook page defaced

Former US Secretary of State Colin Powell has had a few juicy things to say about ex-president George Bush over the last couple of days - or the person using his Facebook account has, at any rate.

White House calls on China to put a stop to hacking

A senior White House official has demanded that China stop hacking US computer systems and agree to a set of international rules on behavior in cyberspace.

Google's Chrome OS remains locked down and secure

Google's rapidly evolving web-centric Chrome OS managed to stave off hordes of hackers this past weekend at Mountain View's Pwnium (3) hack event.