This demo shows that “evil maid attacks,” hacks where an attacker has physical access to a target computer, are not as complicated as you may think.
When emails go to the US, they're open to eavesdropping.
Contrary to recent reports, the spy tool Yahoo used to search its users emails was not just a custom version of its spam and child pornography filtering system.
Allowing all apps kernel-level privileges is one hell of a super move.
Mobile phone carriers and manufacturers have been adamantly insisting that nothing on a mobile phone is logging or sending sensitive data without the consent of the user.