For pen testing firm IOActive, security is cultural not transactional

IOActive may not be a household name but you almost certainly know its work. The Seattle-headquartered company has been behind some of the most breathtaking hacks in the past decade. Its researchers have broken into in-flight airplanes from the ground and reverse engineered an ATM to spit out gobs of cash. One of the company’s […]

How to protect your smartphone from hackers and intruders

Having your smartphone hacked can feel like someone robbed your house. It’s a massive invasion of privacy and a violation of your personal space. We’ve put together a checklist of precautions that will help you avoid this terrible fate.

Leaving for a competitor? Onboarding new employees? Avoid accusations of trade secret theft

When a company hires talent away from a competitor, onboarding the new employee can pose significant legal risks for both the company and the new employee. A fundamental aspect of Silicon Valley is…

How Not To Prevent a Cyberwar With Russia

Former cybersecurity officials warn against a path of aggression that could inflame cyberwar rather than deter it.

A Plan to Stop Breaches With Dead Simple Database Encryption

Database giant MongoDB has a new encryption scheme that should help slow the scourge of breaches.

US to Russia on Nuke Experiments: Do as We Say, Not as We Do

The US is quietly ramping up its plutonium experiments even as Washington raises concerns about Russian testing.