how to
How to Spot and Remove Stalkerware

As if there aren’t enough tech security threats to worry about, you also need to be on your guard against so-called ‘stalkerware’—those invasive types of programs installed by suspicious spouses, jealous exes or controlling parents without your knowledge. Here are the warning signs (on your computer) to look out for, and what you can do about them. Read More >>

security
How to Protect Your PC From Trolls, Hackers and Other Obnoxious Security Threats

It’s a scary fact of digital life that there are a lot of ways your PC can be exposed. Maybe you’ve been hacked by a state agent, or cracked by weird Nazi trolls. Fortunately you’re not powerless, and there are lots of ways to fight back. You don’t need to be a hacker, cracker, or computer savant to protect your laptop. Read More >>

Spying
watch this
Spyware Demo Video Shows How Easily Governments Can Monitor Computers

As if Flash needed any more terrible press. A never-before-seen video showing off a live demo of a hacking tool has been obtained my Motherboard, and it makes for pretty scary viewing. Read More >>

wtf
How the Hell Are These Popular Spying Apps Not Illegal?

Here are some sordid scenarios. Your ex-girlfriend can see every time you swipe right while using Tinder. Your former husband is secretly listening to and recording your late-night Skype sessions with your new boyfriend. Some random perv is rubbing one out to the naked photos in your private photo library. For millions of people, it's not hypothetical. Read More >>

security
The Scam Hunter: What it’s Like to Track Internet Bad Guys for a Living

These days, new malware scams are a dime a dozen. Phony email links, misleading URLs, fake call centres; if you haven't already stumbled across one yourself, chances are you know someone who has. But what's stopping all this malicious code from running rampant and turning every last corner of the internet into a kill zone? Read More >>

privacy
A Peek Inside the NSA’s Spy Gear Catalogue

Der Spiegel's fairly harrowing report about the NSA's hacking unit, Tailored Access Operations (TAO) got a little more harrowing this morning when an unnamed blogger at LeakSource published images from the agency's hilariously-named and terrifying spy gear catalogue. Read More >>

QR-Glass-Hack
google glass
All It Took to Hijack Google Glass Was a Dumb QR Code

The scariest Google Glass hack just got fixed before anyone evil could actually use it, but the details are a little unsettling. Using nothing more than Glass's camera and a malicious QR code, hackers would have been able to steal total control of the device if you so much as looked at the wrong thing. Read More >>

privacy
How Rental PCs Loaded With Spyware Snooped on and Photographed Their Users

When you pay to use a computer, you don't expect it to be tracking your each and every digital move as a result. But that's exactly what happened to Aaron's Sale and Leasing customers — who had their rental computers snooped on in incredible detail. Read More >>

security
Flame Hijacks Microsoft Update to Spread Malware Disguised As Legit Code

It's a scenario security researchers have long worried about, a man-in-the-middle attack that allows someone to impersonate Microsoft Update to deliver malware - disguised as legitimate Microsoft code - to unsuspecting users. Read More >>

security
Meet ‘Flame’, The Massive Spy Malware Infiltrating Iranian Computers

A massive, highly sophisticated piece of malware has been newly found infecting systems in Iran and elsewhere and is believed to be part of a well-coordinated, ongoing, state-run cyberespionage operation. Read More >>

apple
New Mac Trojan Earns Other People Bitcoins on Your Dime

Odd, I could have sworn Bitcoin was on the fast track towards technological irrelevance. So why is this new Mac malware harnessing infected GPUs to mine the digital dollars? Read More >>