A recent study found that around one in five emails you open are tracked.
"I have drunkenly sexually assaulted or raped women — the exact number of which I am currently determining."
Two-factor authentication adoption rates are low. Is it because cybersecurity experts are making the perfect the enemy of the good?
Cities that were at the forefront of limiting their own participation in aggressive federal immigration enforcement are now expanding the scope of their work: Protecting their residents from data collection and surveillance, too.
A serial leak of the agency's cyberweapons has damaged morale, slowed intelligence operations and resulted in hacking attacks on businesses and civilians worldwide.
Some of the biggest companies turn over their workers' most personal information to the troubled credit reporting agency Equifax.
In recent undercover tests of multiple airport security checkpoints by the Department of Homeland Security, inspectors said screeners, their equipment or their procedures failed more than half of the time, according to a source familiar with the classified report.
The devices are intentionally limited technically, so they don't have the capability to listen to your conversations.
Computers are not good at generating random numbers, so encryption company Cloudflare has to find a physical manifestation of chaos.
For years, Amy Kono, a 35-year-old project manager from California, has been getting emails from Sprint that aren't meant for her.
"Ingress," a predecessor to "Pokémon Go," is a game that rewards intense strategizing. Unfortunately, unscrupulous players have gone a step further by tracking and intimidating others.
"Amazon Key is a service exclusively for Prime members that radically improves the convenience of receiving deliveries."
Earlier this month, a researcher discovered Wi-Fi has a fundamental security flaw. Again.
Gizmodo slogged though every line of Ancestry.com, 23andMe, and Helix's privacy, terms of service and research policies with the help of experts in privacy, law and consumer protection. What we found wasn't pretty.
WPA2 protocol used by vast majority of wifi connections has been broken by Belgian researchers, highlighting potential for internet traffic to be exposed.
If you haven't kept up with the avalanche of mistakes big and small that followed the Equifax breach, John Oliver has you covered. No, he can't get you a new social security number though, stop asking.
In order to tempt nuclear scientists from countries such as Iran or North Korea to defect, US spy agencies routinely send agents to academic conferences — or even host their own fake ones.
The Treasury Department’s Office of Intelligence and Analysis has been illegally rifling through and filing away the private financial records of US citizens, Treasury employees alleged. “This is such
The company said last December that data from more than 1 billion user accounts was compromised in the largest breach in history, but is now tripling that figure
The dating app knows me better than I do, but these reams of intimate information are just the tip of the iceberg. What if my data is hacked — or sold?
That's our best stuff for today. Great job! Read more