The former Air Force cyber warrior is a CEO again.
Warrants can be used to target devices regardless of physical location.
A stranger cannot find you in the app, says the app.
Related to the hacking of the LA Times.
William Turton joins the site from the Daily Dot.
"We have a tool that works on a narrow slice of phones."
A new study found a worrying gap between presumed and actual corporate readiness for data security incidents.
The attacks include one from 2013 against a dam in upstate New York.
Plus, why Hindawi hates Silicon Valley corporate culture: "My people don’t give a shit about the coconut water."
A rundown of the week's Apple-FBI headlines.
One adviser to the startup is the subject of the 2002 movie "Catch Me If You Can."
This is one way to "slow things down."
The fight over encryption technology heats up more.
A $6 billion system intended to scan for attacks uses only the most basic techniques -- and doesn't even do that very well, a government audit has found.
The same tricks used against bot armies on the Web can now help fend off attacks against mobile APIs.
Was it maybe the NSA?
Chasing terrorists off social media could make it harder to track them.
The company plans a "state-of-the-art facility" to respond to threats in real time.
Hundreds of names have been revealed.
The great KKK-outing of 2015 is still coming.
So who's the sober driver?
The company plans to build a privacy-protecting film layer into mainstream business PCs by the middle of next year.
Take it with a grain of salt.
The affected database contained names, addresses, Social Security numbers and email addresses.
The breach snagged email addresses, usernames and shipping addresses.
The data stolen included names, dates of birth, addresses and Social Security numbers.
The bug that wouldn't die.
He really, really wants Silicon Valley in his corner.
That's 4.5 million more than initially reported.
Cyber security researchers used the Internet to turn off a car's engine as it drove.
The workers said Sony's negligence forced them to beef up credit monitoring to address their greater risk of identity theft.
A steadily growing list of senior executives have lost their jobs in the wake of high-profile hacking attacks. There will be more.