Phone Hacking

Digital hygiene isn't much different from any other kind, but in the same way parents pass on common sense advice to wash your hands frequently during cold and flu season, it's crucial to learn about your various exposures and how to spot trouble when it happens.
As time passes following the FBI's announcement that it accessed the iPhone without Apple's help, I'm glad to see some of the answers are starting to take shape -- but the answers are not particularly good for Apple, or for the general public's right to privacy.
The San Bernardino terrorist suspect Syed Rizwan Farook used an iPhone 5c, which is now in the possession of the FBI. The iPhone is locked. The FBI wants Apple to help unlock it, presumably so they can glean additional evidence. Apple has declined.
These questions originally appeared on Quora - the knowledge sharing network where compelling questions are answered by people
FOR YEARS THE government has kept mum about its use of a powerful phone surveillance technology known as a stingray. Read
On Friday, the White House convened a “cyber summit” at Stanford’s campus in Palo Alto so that business and government leaders
The last several years have been good for criminal hackers and bad for consumers. From last year's unprecedented string of major retailer breaches to the massive JP Morgan hack and Sony's epic debacle, hackers have been almost unstoppable. So what should consumers expect for 2015?
For the most part, of course, technology today makes our lives simpler. Except when someone won't get off of our cloud, and we feel, as my friend said after losing her iPad, "lost, stupid, untethered, paranoid and violated."
In that bygone era of punched cards and tabulating machines, a computer disaster might have been a dropped box of cards. We couldn't do anything very exotic with these simple machines; the Internet and home computers were in no one's crystal ball, but neither was the worry of getting hacked.
Flip phones are certainly not "safer" than smartphones.
The scandal caused ripples throughout Britain and prompted Rupert Murdoch to shutter the paper in 2011. At the sentencing
The scam was first uncovered at the paper in 2006, but Murdoch's British newspaper arm News International said then it was
For the past decade the US has tolerated cyber attacks on the critical infrastructure. Government agencies have tried to
Google is planning to open Gmail and YouTube to kids under the age of 13. While the company will restrict this king's ransom of new clicks to kid-friendly content, hackers could well have a field day.
But, we think it's safe to say the shocking comments were tongue-in-cheek. The actress went on to say she couldn't understand
I bet it was much more difficult to leak nudes back in the "oughts" and early twentieth century. You couldn't sit all day and night in a dark room with Slayer playing in the background. Leaking photographs of Theda Bara or Anna Pavlova took time and patience.
This is great for so many reasons. First, because the phone hacking story is an awesome one full of dramatic twists and turns
If you are a guy who has to assault a woman's dignity and privacy in order to fulfill your sexual fantasies, that says far more about you than it does about her.
As smartphones are increasingly used for financial transactions, sharing sensitive personal and proprietary information, and for operating other devices (such as home security systems), the field for intruders grows and becomes increasingly attractive.
His trial, one of the most expensive of its kind in British legal history, heard that thousands of victims from celebrities