| Are your communications secure? There are many overhyped "cryptophones" and crypto software programs available today, but can you really tru...
| Are your communications secure? There are many overhyped "cryptophones" and crypto software programs available today, but can you really tru...
| The security of the internet remains rickety and now we're starting to hook up physical objects like cars, smart meters and home automation...
| Ubiquitous sensors, tell-tale WiFi signals, smart meter information, always-on wearable technologies and the roll-out of networked Internet...
| CyanogenMod, a community built distribution of Android, has teamed up with Open WhisperSystems to provide user friendly cross-platform encry...
| Lavabit and Silent Circle, two secure email providers, launched the Dark Mail Alliance with the aim to provide private and secure email. Cen...
| As the recent NSA leaks highlight the importance of privacy enhancing tools, Adafruit presents the Onion Pi. This DIY project explains how s...
| Consumer grade EEG-scanners used in mind-controlled games can be turned against their user to extract private information, research shows....
| Privacy enhancing tools have a bad reputation when it comes to usability. Nathan Freitas of The Guardian Project demonstrated easy to use ap...
| A hack of the Certificate Authority (CA) DigiNotar has moved web browser providers to invalidate all its certificates. Including those authe...
| A string of internet security breaches over the last year have brought the discussion about cyber security to the public domain. At the Aspe...