DNC Hackers Resurface, Zuckerberg Talks Free Speech, and More News

Credit to Author: Alex Baker-Whitcomb| Date: Thu, 17 Oct 2019 22:16:36 +0000
Catch up on the most important news from today in two minutes or less.
Read more
Credit to Author: Alex Baker-Whitcomb| Date: Thu, 17 Oct 2019 22:16:36 +0000
Catch up on the most important news from today in two minutes or less.
Read more
Credit to Author: Louise Matsakis| Date: Thu, 17 Oct 2019 20:16:47 +0000
As pro-democracy protests continue in Hong Kong, the tech giant’s troubling relationship with an authoritarian regime has come into focus.
Read more
Credit to Author: Andy Greenberg, Excerpt| Date: Thu, 17 Oct 2019 10:00:00 +0000
The untold story of how digital detectives unraveled the mystery of Olympic Destroyer—and why the next big cyberattack will be even harder to crack.
Read more
Credit to Author: Andy Greenberg| Date: Thu, 17 Oct 2019 09:30:00 +0000
Largely out of the spotlight since 2016, Cozy Bear hackers have been caught perpetrating a years-long campaign.
Read more
Credit to Author: Lily Hay Newman| Date: Wed, 16 Oct 2019 18:32:17 +0000
Federal investigators focused not on offensive hacking efforts or surveilling communications, but on the transactions using cryptocurrency.
Read more
Credit to Author: Lily Hay Newman| Date: Tue, 15 Oct 2019 18:36:04 +0000
The company is turbocharging its bug bounty to try to stop the next data leak before it happens.
Read more
Credit to Author: David Nield| Date: Sun, 13 Oct 2019 11:00:00 +0000
The latest macOS update is chock-full of ways to better safeguard your data.
Read more
Credit to Author: Brian Barrett| Date: Sat, 12 Oct 2019 13:00:00 +0000
FBI overreach, hacker payback, and more of the week’s top security news.
Read more
Credit to Author: Andy Greenberg| Date: Thu, 10 Oct 2019 15:07:42 +0000
A new proof-of-concept hardware implant shows how easy it may be to hide malicious chips inside IT equipment.
Read more
Credit to Author: Lily Hay Newman| Date: Wed, 09 Oct 2019 18:32:07 +0000
Twitter funneled two-factor authentication phone numbers into their ad targeting platform—but they weren’t the only ones.
Read more