Tor Messenger Lets People Chat Securely
The Onion Router project makes people anonymous to government surveillance systems giving them security on their communications.
The IACP Unveils Odd Cop Cars
TerraHawk and Oshkosh Defense showcase their odd vehicles at the IACP tradeshow.
US Senate Approves Cybersecurity Information Sharing Bill
Despite the criticisms, the U.S. Senate manages to approve the Cybersecurity Information Sharing Act and is now in its final stages before heading to the White House for President Obama's approval.
Malware Transforms Security Cameras Into Botnets
Incapsula researchers have found out a malware that has turned security cameras into botnets.
Voyo Transforms Standard Cars To Smart Cars
Car tech startup Voyomotive has designed a Voyo dongle that can convert old-fashioned standard cars to futuristic smart cars.
BlackBerry Shows How The Priv Has Deadlock Security
With the Priv being the first Android smartphone by BlackBerry, the company has outlined why it still features the best mobile security Waterloo has long been known for.
EE Debuts Robin Tablet Designed For Kids
UK's EE has designed a child-friendly tablet that will be available to public before the end of October.
Samsung Releases Monthly Updates
After the Stagefright scare took over Android devices last July, Google has been delivering monthly updates to users of select Android devices. Now Korean manufacturer Samsung has also revealed monthly updates for the company's devices.
The GranitePhone By Sikur/Archos Focuses On Lockdown Security
Archos dives into the niche market of security-focused smartphones with the GranitePhone.
The $1 BIllion Contract To Protect Government Websites
The Department of Homeland Security signs a deal with defense contractor Raytheon to secure government websites.
Foreign-held telecomm companies excluded from NSA surveillance sweep
Two major U.S. telecommunications companies were exempted from the NSA's metadata spying program not because they refused to cooperate, but because foreign companies have too much control over them.
Microsoft gives zero-day exploits to military before patching them: Report
Microsoft and various other tech and manufacturing firms are apparently handing sensitive data over to the U.S. government for preferential treatment. Can U.S. tech firms ever be trusted again?
Unhackable quantum cryptography can be hacked
Quantum cryptography was once thought as the holy grail of encryption. But it appears that even the laws of physics can't prevent hackers from intercepting, or interrupting, apparently secure information. Can information ever be secure?
Obad: The scary new Android trojan that's almost impossible to delete
Android has a new trojan in town, and it has security researchers concerned. It's called Obad, and it shares some unfortunate traits with Windows malware.
Apple's two-step verification system has a major problem
Apple's two-step verification system has a major problem: it doesn't protect user data. That's right, the tech giant's security feature may prevent children from making unauthorized purchases, but it'll do little to prevent a hacker from destroying your online life.