Hacking

12.02.15
Homeland Security will hack you if asked nicely
12.02.15 in

Homeland Security will hack you if asked nicely

Uncle Sam knows that the best defense is a good offense.

By T. Seppala,   12.02.15
View
11.25.15
This Raspberry Pi handheld wants to be every gadget in the world
11.25.15 in

This Raspberry Pi handheld wants to be every gadget in the world

Someone crammed a Raspberry Pi, a ton of sensors and a touchscreen into a case the size of a credit card

By S. Buckley,   11.25.15
View
11.20.15
WSJ: China's government wants homegrown, backdoor-free phones
11.20.15

WSJ: China's government wants homegrown, backdoor-free phones

Here's the downside: no WiFi, no GPS and no Bluetooth

By D. Cooper,   11.20.15
View
11.19.15
Let's have an argument about encryption
11.19.15 in

Let's have an argument about encryption

A backdoor isn't a privacy problem, it's a security one.

By V. Blue,   11.19.15
View
11.13.15
The Pentagon's plan to outsource lethal cyber-weapons
11.13.15

The Pentagon's plan to outsource lethal cyber-weapons

The Pentagon has quietly put out a call for vendors to bid on a contract to develop, execute and m...

By V. Blue,   11.13.15
View
11.03.15
ICYMI: Floating wind farm, autonomous robot delivery & more
11.03.15

ICYMI: Floating wind farm, autonomous robot delivery & more

Here's hoping the delivery robots don't get the HitchBOT treatment.

By K. Davis,   11.03.15
View
10.30.15
Hacking Team offers encryption breaking tools to law enforcement
10.30.15

Hacking Team offers encryption breaking tools to law enforcement

There's more than one way to crack an iPhone.

By A. Tarantola,   10.30.15
View
10.29.15
The coming smart-thing apocalypse
10.29.15

The coming smart-thing apocalypse

When it comes to hacking the Internet of Things, the biggest thing we have to worry about with smart devices is their stupidity.

By V. Blue,   10.29.15
View
10.21.15
Fitbit trackers can be hacked in '10 seconds' (update: Fitbit disagrees)
10.21.15

Fitbit trackers can be hacked in '10 seconds' (update: Fitbit disagrees)

The attacker just needs to be in Bluetooth range to install trojans or other malware.

By S. Dent,   10.21.15
View