Security News

Former counterterrorism chief Richard A. Clarke told NPR questioned the FBI's motivations in its debate against Apple over unlocking a terrorist's iPhone.


This research shows the power of cell phone metadata. From an article by the author: Yemen has experienced an array of violent incidents and political turmoil in recent years, ranging from al...





Two researchers from Michigan State University’s biometrics group have devised a method for hacking mobile phone’s fingerprint authentication by using just a color inkjet printer, a special type...


It's not just governments. Companies like Dstillery are doing this too: "We watched each of the caucus locations for each party and we collected mobile device ID's," Dstillery CEO Tom Phillips...