Jul 11, 2014 — The sloppy handling by federal scientists of the world's scariest germs must stop, says the dismayed head of the Centers for Disease Control and Prevention. Are his new rules enough?
Apr 24, 2014 — Google, Intel and others say they will now financially support the open-source software that encrypts much of the traffic on the Internet. The effort follows the discovery of a key security flaw.
Feb 13, 2014 — The world is at greater risk than ever from pandemics and biological weapons, health officials said Thursday. In response, the U.S. government is spearheading a global effort to build an early warning system for infectious diseases, drug-resistant microbes and possible bioterror agents.
Aug 16, 2013 — This summer, The New York Times moved all of it reporters' email to corporate Gmail accounts. This move to a third party could leave Times reporters and their sources with fewer legal protections if they are the subject of a government investigation.
Aug 2, 2013 — Few details have emerged about the U.S. plan to shut down embassies that would normally be open this Sunday. A senior State Department official says that the U.S. facilities may close for more days, as well. The closures are described as "precautionary steps" taken "out of an abundance of caution."
Jul 30, 2013 — Chris Valasek and Charlie Miller have been hacking into products for a long time. But they don't steal stuff or mess with people; instead, their purpose is to pressure companies into making their products more secure. Their recent research on hacking cars has shown just how dangerous these kinds of attacks could be.
Jun 11, 2013 — Big Data raises concerns about more than just privacy. The debate opening up before us is an essential one for a culture dominated by science and technology. Who determines if a technology is adopted? Who determines when and how it will be deployed? Who owns our data? What are our rights in this new world?
Feb 17, 2013 — For a fee, Silent Circle erases messages from both the receiver and the sender's phones. The app's creators got the idea after hearing an all-too-familiar story: A friend of theirs inadvertently read a text meant for someone else.
Jul 7, 2010 — Forget your social security or credit card numbers — some hackers can now access your personal identification with just your cell phone number.
Apr 28, 2010 — A new ad for Internet monitoring software from Spector Pro is the scariest thing we've ever seen.