Posted In: shipping, hacking
Fake radio signals can be used to make ships that don't exist appear on the tracking system.
Posted In: nsa, Edward Snowden, encryption, internet security
New information about NSA surveillance activity emerges. Even encrypted data is vulnerable to its data mining.
Posted In: NSA leaks, nsa, Edward Snowden, Microsoft, PRISM
New documents, leaked by Edward Snowden and reported in The Guardian newspaper, show how the NSA got Microsoft to circumvent its own encryption to intercept Outlook and Skype communications.
Posted In: China, hacking, cybersecurity
U.S. officials gave American Internet providers information on suspected cyber spies in China as part of a secret program to defend against cyberespionage.
Posted In: apple, ios, hacking
A group of German researchers has found a security problem in Apple's Internet hotspots for mobile devices. Turns out, they can be easily hacked.
Posted In: health care, hospital, medical records
As hospitals become more automated, the dangers of computer viruses become more serious.