As foreign hackers target election data, voters may lose faith in digital ballots.
Apple just released a patch that fixes three giant vulnerabilities in iOS.
It can even be trained to read your lips.
Internal documents appear to confirm that this week’s leak came from the agency.
Hackers can use artificial intelligence to mimic their targets’ tweets—and entice them to click on malicious links.
A group calling itself the “Shadow Broker” is auctioning off what it says are the agency’s cyberweapons.
When officers categorize wallets or cellphones as evidence, getting them back can be nearly impossible—even if the owner isn’t charged with a crime.
A meteorologist is harnessing data from the devices’ barometers to improve local forecasting.
Press 🅰 to waterboard.
There’s a gaping security hole in eight popular models.
The nominee is woefully unprepared for questions about the future of digital conflict.
Can a mysterious device help the government protect Northern Virginia from nukes?
For a brief period, confusion in the country was compounded by a Facebook and Twitter blackout.
New technology to block photography at concerts hints at an alarming future for smartphones.
Google revealed that it sends 4,000 warnings monthly about state-sponsored cyberattacks.
Your lockscreen is the new A1.
A group of academics and journalists say a federal computer-fraud law criminalizes their work.
A proposed change to a common U.S. customs form would allow the government to vet travelers’ social media accounts.
The challenge of accounting for the damage reflects an outdated approach to cybersecurity.
Facebook users threaten violent revolution every time the site tweaks its design. Is there a way to innovate without upsetting anyone?