Security | News, how-tos, features, reviews, and videos
Leaked document details the procedures used by the NSA to limit data collection from U.S. citizens
While the Lone Star state is the first, it is unlikely to be the last to pass a law requiring law enforcement to obtain a warrant to read people's email
The new legislation would prevent prosecutors from targeting computer users for terms of service violations
From Snowden to security to surveillance, privacy to protection, Cringely's readers have lots to say on these topics and more
Stanford Law School is launching a Cookie Clearinghouse -- a centralized repository for whitelist and blacklist data on web tracking
In a possible DNS hijacking, the website's domain name was temporarily redirected to a third-party server, putting user accounts at risk
Domestic Internet firms face political, economic consequences for breach of trust over the NSA surveillance controversy
Hackers can also net $100,000 for finding Windows 8.1 Preview vulnerabilities at Black Hat 2013 live bounty event
Some of the vulnerabilities Java 7u25 fixes also affect sever deployments of Java
Security researcher Alexander Polyakov finds thousands of unpatched, insecure SAP servers scattered all over the world