As searches of smartphones and other digital devices at US borders become more common, can research and computer science help protect travelers’ privacy?
The darknet, like the open internet, is not immune from illegal activity. But many darknet users are there in search of ‘hacker ethics’ values such as privacy and free speech.
If only it were this easy.
'Keyboard' via shutterstock.com
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.
Ransomware – which encrypts your files and offers to sell you the key – operates differently from other malicious software. Those differences turn out to give potential victims a fighting chance.
An Internet of the future, where every network connection could be secure.
Padlock network via shutterstock.com
Apple’s refusal to back down in its fight with the FBI is a sharp reversal from just a few years ago when it was the government urging tech companies to do more to protect consumer privacy.
What does it take to get at the secrets within an iPhone 5c?
Eduardo Munoz/Reuters
Scientific advances – including the recent discovery of gravitational waves – force us to deal with numbers so extreme they’re virtually inconceivable.
What would you do if your files were locked away?
Shutterstock
An open letter signed by security experts from around the world is calling on governments to protect encryption rather than undermine it in a quixotic attempt to tackle terrorism.