With its refusal to unlock San Bernardino shooter’s iPhone, Apple is fighting for us all
A federal judge on Tuesday afternoon ordered Apple to provide technical assistance to the FBI with respect to accessing an iPhone 5c owned by Syed …
A federal judge on Tuesday afternoon ordered Apple to provide technical assistance to the FBI with respect to accessing an iPhone 5c owned by Syed …
Shortly after revealing the contact information of nearly 10,000 Department of Homeland Security employees, a group of hackers on Monday also published the contact information …
Virtual private networks (VPNs) are supposed to help users protect their online privacy. VPN services obfuscate the user’s real IP address by routing traffic through …
A new mobile exploit recently unveiled at the MobilePwn2Own panel at the PacSec conference this week enables an attacker to take control of any Android …
Led by Joel Land, security researchers from Carnegie Mellon University’s Computer Emergency Response Team (CERT) recently discovered that a popular Belkin router contains a number of serious …
While the prevalence of smartphones with fingerprint-based security has increased considerably over the past two years, the vast majority of Android users still rely on tried and true …
In the realm of antivirus software, few companies are as respected as Kaspersky Lab. Based out of Moscow, Kaspersky over the years has garnered a …
Before the arrest of Silk Road creator Ross Ulbricht made headlines a few years ago, most everyday web users had never heard of Tor. Originally developed …
Another day, another Android vulnerability. Just days after researchers disclosed an MMS-based Android vulnerability that potentially puts 950 million Android devices at risk, a different group of …
Over the past few years, there has been no shortage of high-profile credit card breaches at some of the largest retailers in the country. From Target to …
As typically portrayed in action movies, breaking into an ostensibly impenetrable safe often requires a world class lock-picker or, barring that, an array or C4 explosives …
Earlier this month, we highlighted an intriguing new piece of hardware capable of providing secure and anonymous Wi-Fi connectivity within a 2.5 mile radius. The …
While encryption and secured messaging has long been a topic of interest in tech circles, the issue became a mainstream and hot-button issue in 2013 …
With each passing year, consumers continue to spend more and more time and money shopping online, both via mobile devices and the desktop. As a …
Next month during the Def Con hacker conference in Las Vegas, security researcher Ben Caudill will unveil a potentially game changing device called a ProxyHam. …
Stolen email and passwords belonging to individuals from nearly 50 Government agencies have leaked online, according to a CIA backed startup out of Boston. According to …
Just a few days after a researcher at the Blackhat Mobile Security Summit in London disclosed a keyboard vulnerability that put upwards of 600 million Samsung …
A recent report from Trustwave on the state of malware relays that online crime, unfortunately, does pay. The report, originally cited by Net Security, relays …
These days, it appears as if no one is safe from hackers. Just a week after the security firm Kaspersky announced that they had been hacked …
The FBI is worried that stronger encryption from tech companies like Apple is making it more difficult for law enforcement agencies to effectively keep tabs on terrorists. As …
We might be entering a whole new era of malware, one where even those who lack any semblance of deep technical expertise will be able to …
A new in-depth study from Google reveals that the security questions most individuals use as an additional layer of security are often less secure and …
One of the most important things to do before selling or giving away a used smartphone is to wipe the device clean. After all, the …
Because people are generally unable to come up with rock-solid passwords on their own, many websites that require user-generated passwords employ “password strength meters” which inform users …
Given the myriad of security mechanisms and technologies tech companies have developed, it’s easy to fall into a sense of complacency and think that what you’re …
While the NSA certainly has the technical chops to eavesdrop, monitor, and intercept all types of electronic communications, they’re also not afraid to employ more …
Here at BGR, we’ve done our best over the years to give you everything you need to keep your private information safe, but we never …
Former NSA director Keith Alexander will charge companies up to $1 million a month to keep them safe from online hackers, Foreign Policy reports. Apparently …
More documents released by NSA whistleblower Edward Snowden detail another bulk data collection spying initiative that consists of monitoring services like Facebook and Google’s YouTube …
Security firm AVG on Tuesday updated its PrivacyFix security app for Android devices to include mobile location tracking features that would prevent stores and advertisers …