Source: salon.com

File-sharing software on state election servers could expose them to intruders - Cyber security news

File-sharing software on state election servers could expose them to intruders

Can Facebook use AI to fight online abuse? - Cyber security news

Can Facebook use AI to fight online abuse?

Politicians and media don’t understand how hacking works - Cyber security news

Politicians and media don’t understand how hacking works

Facebook allowed political ads that were scams and malware - Cyber security news

Facebook allowed political ads that were scams and malware

Instagram’s political propaganda spread to millions of users - Cyber security news

Instagram’s political propaganda spread to millions of users

The DNC's emails weren't only hacked, they were edited: report - Cyber security news

The DNC's emails weren't only hacked, they were edited: report

John Oliver rips Equifax for data breach: Doing

John Oliver rips Equifax for data breach: Doing "literally everything wrong"

Ask your kid’s school these essential student privacy and safety questions - Cyber security news

Ask your kid’s school these essential student privacy and safety questions

Russian hackers exploited a Google flaw — and Google won't fix it - Cyber security news

Russian hackers exploited a Google flaw — and Google won't fix it

How badly did Equifax breach damage the Social Security system? - Cyber security news

How badly did Equifax breach damage the Social Security system?

Google’s secret NSA alliance: The terrifying deals between Silicon Valley and the security state - Cyber security news

Google’s secret NSA alliance: The terrifying deals between Silicon Valley and the security state

MalwareTech’s arrest sheds light on the complex culture of the hacking world - Cyber security news

MalwareTech’s arrest sheds light on the complex culture of the hacking world

The “keys to the cyber caliphate”: The daring U.S. raid to seize the ISIS personnel database - Cyber security news

The “keys to the cyber caliphate”: The daring U.S. raid to seize the ISIS personnel database

Bypassing Encryption: Next frontier of Law Enforcement Tech is

Bypassing Encryption: Next frontier of Law Enforcement Tech is "Lawful Hacking"

Need of Hackers More in this Increasingly Connected World  - Cyber security news

Need of Hackers More in this Increasingly Connected World

Cyber-Deterrence: A Difficult Task with Huge Potential - Cyber security news

Cyber-Deterrence: A Difficult Task with Huge Potential