Surveillance of Your Car
August 2 2022TheMarkup has an extensive analysis of connected vehicle data and the companies that are collecting it. The Markup has identified 37 companies that are part of the rapidly growing connected...
Read moreTheMarkup has an extensive analysis of connected vehicle data and the companies that are collecting it. The Markup has identified 37 companies that are part of the rapidly growing connected...
Read moreA Justice Department official testifies to a House committee that the cyberattack is a "significant concern."
Read moreCustomers across several European countries are urged to update credentials in the wake of the attack that affected a gas-pipeline operator and power company.
Read moreCanary tokens — also known as honey tokens — force attackers to second-guess their potential good fortune when they come across user and application secrets.
Read more"Bruggling" emerges as a novel technique for pilfering data out from a compromised environment — or for sneaking in malicious code and attack tools.
Read more"Bruggling" emerges as a novel technique for pilfering data out from a compromised environment — or for sneaking in malicious code and attack tools.
Read moreGnuTLS may well be the most widespread cryptographic toolkit you've never heard of. Learn more...
Read moreGnuTLS may well be the most widespread cryptographic toolkit you've never heard of. Learn more...
Read moreCome up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreTech companies play a vital role in global communication, which has profound effects on how politics, policies, and human rights issues play out.
Read more
Recent Comments