Newly unsealed FBI documents suggest the Israeli arrested for sending the threats was selling his services for a fee.
A Q&A with cybersecurity expert Michael Sulmeyer on today’s Armed Services Committee hearing and the intelligence community’s response to foreign interference
The Washington Post’s David Fahrenthold opened up to his audience, using crowdsourcing to explore the president-elect’s charitable activities.
The right way to deal with social media’s neo-Nazis is not by taking away their platforms, but by taking away their audiences.
The Silicon Valley billionaire says he’s backing Trump because the GOP nominee doesn’t offer easy solutions, but that’s all he offers.
It’s not what she wrote—it’s her tendency to wall herself off from alternative points of view.
A newly proposed anti-encryption bill would put every American at greater risk from foreign governments, hackers, and President Trump.
Andy Grove’s life reveals the role of public investment in creating and nurturing Silicon Valley—and the dangers of disinvestment.
In 10 years of existence, Twitter has given rise to forces that are completely reshaping the course of political dialogue.
An alphabet soup’s worth of government agencies are exercising their ability to look down on ordinary citizens.
It’s historically brought together Democrats and Republicans—but the Apple-FBI fight is starting to align along party lines.
The examples put forward by FBI Director James Comey and his defenders are underwhelming.
The FBI wants to force tech workers to write code that they believe to be unethical, dangerous, and harmful to their country.
If you work for a government agency, your taco emoji are federal records.
A private company has captured 2.2 billion photos of license plates in cities throughout America. It stores them in a database, tagged with the location where they were taken. And it is selling that data.
Traditional definitions of valor don’t always account for the practitioners of advanced war-fighting tactics.
Employees seeking to report wrongdoing are safeguarded across all federal agencies—but the process for doing so in the classified intelligence community can be dangerous.
Computer models can determine the authorship of unsigned legal decisions with startling accuracy.
What makes a private company’s algorithm label some people and addresses more threatening than others during 911 calls?
And what it says about the difficulty of encryption