Maxwell allegedly believed it would help her avoid surveillance.
Do you want to protest your company’s crappy record on sexual harassment? Are you thinking of unionizing? Here’s the Motherboard Guide to Secure Labor Organizing.
The cybersecurity industry is worth billions of dollars, and tens of thousands of people attend Black Hat and Def Con every year. So, are we getting any safer?
Every year, infosec Twitter debates whether people should bring a burner phone to conferences like Def Con or Black Hat. Here’s why we think you don’t need to worry about that.
I get packages delivered to friends and don’t have my name on my doorbell. But all of my work may have been undermined by a cheap mattress.
Redacted court documents keep getting unredacted because of simple, relatively easy to avoid errors. Here’s how to better redact PDFs.
CBP and DHS officers allegedly detained a Los Angeles man of Muslim faith for four hours before he boarded a plane, asking him questions and pressuring him to show them the contents of his phone.
A vendor manual for voting machines used in about ten states shows the vendor instructed customers to use trivial, easy to crack passwords and to re-use the passwords when changing log-in credentials.
Guessing the anonymous author of the Trump op-ed in The New York Times based on the use of the word ‘lodestar’ is “entirely useless,” according to a forensic linguist.
Journalists and sources may try to secure their communications not just with encryption, but also with automatically disappearing messages. But Signal has a nasty bug that can retain some messages.
Don’t commit crimes. But if you do, don’t back up the evidence of your crimes to Apple or Google’s cloud, where it doesn’t matter that the evidence was originally end-to-end encrypted.
In the 1950s and 1960s, the NSA was very worried about employees spilling secrets. Here’s some of the best internal propaganda posters that taught them to keep their mouths shut.