Movies tell us that paying a ransom means the bad guys win, but in the real world it's not that simple.
We have never been so connected and we are producing more data than ever before. But how can we manage our data effectively while making sure it remains safe?
A way in for government would also allow hackers access.
New standards and regulations are beginning to govern how companies protect customers' data. Companies ignore this vital issue at their peril, both financially and legally.
The Tor Project is upgrading its protections for internet users' privacy and anonymity. A scholar and volunteer member of the nonprofit effort explains what's changing and why.
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
As searches of smartphones and other digital devices at US borders become more common, can research and computer science help protect travelers' privacy?
The latest WikiLeaks revelation shows how far the CIA can take its cyber attacks.
The darknet, like the open internet, is not immune from illegal activity. But many darknet users are there in search of 'hacker ethics' values such as privacy and free speech.
People who think like hackers have some really good ideas about how to protect digital privacy during turbulent times. We can learn from them.
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.
The Micius satellite will encrypt data using fundamental laws of physics rather than crackable codes.
A new type of computer means we'll need a new way to make our data secure.
Ransomware – which encrypts your files and offers to sell you the key – operates differently from other malicious software. Those differences turn out to give potential victims a fighting chance.
Developing tools to weed out would-be attackers from the world's most-used privacy and anonymity system.
Scientists have found a way to encrypt messages using common chemicals such as cola and mouthwash.
The FBI has accessed the data on a shooter's iPhone. What if the device had been running Android?
Researchers face stiff fines or even jail time if they inadvertently communicate with foreign colleagues about matters deemed to have a military use.
The court order to Apple is consistent with the existing law and previous Supreme Court decisions.
Apple's refusal to back down in its fight with the FBI is a sharp reversal from just a few years ago when it was the government urging tech companies to do more to protect consumer privacy.