Is Tor still secure after Silk Road?
The Silk Road trial has concluded, with Ross Ulbricht found guilty of running the anonymous online marketplace for illegal goods. But questions remain over how the FBI found its way through Tor, the software t ...
Upgrade to core HTTP protocol promises speedier, easier web
Hypertext Transfer Protocol, HTTP, is a key component of the world wide web. It is the communications layer through which web browsers request web pages from web servers and with which web servers respond ...
When fake news goes viral, blame the media, says study
It's true. Don't believe everything you read on the Internet.
We are all suspects now thanks to Australia's data retention plans
Australia's Parliamentary Joint Committee on Intelligence & Security (PJCIS) last week endorsed the data retention bill, which means we're all suspects now. ...
Senators call for investigation into Verizon 'supercookies'
(AP)—Democratic senators on Friday called on federal regulators to investigate Verizon Wireless, the country's biggest mobile provider, for secretly inserting unique tracking codes into the Web traffic ...
Spotify deals with random shuffle and us mortals
Change of Internet regulator must happen before US 2016 polls, CEO says
Plans to transfer control of Internet overseer ICANN from US hands to a globally representative body could be jeopardised unless a deal is reached before the 2016 US elections, the group's chief warned Monday.
OpenStreetMap adds A to B directions
Research pair finds color a big factor in how much an image is shared on Pinterest
Giant US health-data breach could lead to China
Data on as many as 80 million customers at US health insurance giant Anthem was stolen by hackers, officials confirmed Thursday, in a cyberattack investigators have reportedly linked to China.
Your privacy online: Health information at serious risk of abuse
There is a significant risk to your privacy whenever you visit a health-related web page. An analysis of over 80,000 such web pages shows that nine out of ten visits result in personal health information being leaked to third ...
Google offers mail payment service in the UK
Four email problems that even titans of tech haven't resolved
The email address as we know it was born when Ray Tomlinson introduced the "@" sign in 1977, since which email has continually grown in popularity as a communication tool for work and pleasure – until last ...
Lenovo's security debacle reveals blurred boundary between adware and malware
A widely disliked habit of PC vendors is their bundling of all manner of unwanted software into brand new computers – demo software, games, or part-functional trials. Faced with shrinking margins vendors ...