smartphones
The Pledge From the Smartphone Industry That Could Stop Your Phone Being Stolen

The likes of Apple, Google, Microsoft and other major figures in the smartphone industry have signed a pledge that will make it harder to steal mobile phones—from July 2015, at least. Read More >>

android
How to Check if Your Android Device Could be Hacked via Heartbleed

Heartbleed is causing heartache on hundreds of servers all over the internet, but security researchers have also warned that the bug could allow direct hacks of Android, too. Here's how to check if your device is at risk. Read More >>

google
Google is Reading Your Emails for Your Browsing Benefit...and for Ads, of Course

Google's updated its terms of service in an effort to be a bit more transparent about its email-scanning practices.  And whether you're harbouring a deep dark secret in your Gmail sub-folders or otherwise, it inevitably comes down to one thing -- making you more valuable to advertisers. Read More >>

security
Try the Super-Secure USB Drive OS That Edward Snowden Insists on Using

We all know that Edward Snowden insists on secure email, but he's also very picky about his operating systems, too. In fact, he uses a free, super-secure version of Linux—called Tails—that fits on a USB stick and can be used on any computer without leaving a trace. Read More >>

security
Police are Testing a "Live Google Earth" to Watch Crime as it Happens

Last year in Compton, Los Angeles, police began quietly testing a system that allowed them to do something incredible: watch every car and person in real time as they ebbed and flowed around the city. Every assault, every purse snatched, every car speeding away was on record—all thanks to an Ohio company that monitors cities from the air. Read More >>

security
Oedipal Heartbleed Hackers Attack Mumsnet

Mumsnet, the parenting blog with 1.5 million registered users, has been hit by hackers exploiting the Heartbleed bug, with the site becoming the first confirmed victim of the security flaw. Read More >>

hackers
Cybersecurity as a War Against Haunted Objects

We've already covered the insane case of a Chinese restaurant menu that served as a successful point of infiltration for hackers to access the private computers of an unnamed oil company, so I won't go into much more detail. However, there was a brief moment in the original New York Times story that deserves a quick shout-out here. Read More >>

privacy
NYT: Obama Lets the NSA Exploit Some Internet Flaws

Over the weekend, it was revealed that President Obama thinks that when the National Security Agency discovers major flaws in internet security, they should be allowed to exploit it if there's a "a clear national security or law enforcement need." Read More >>

design
How a Great Logo Helped Make You Actually Care About Heartbleed

You might not understand the how Heartbleed works, but you definitely heard about it this week. And with it, that drippy, maroon, bleeding heart logo—which is part of what made the story so memorable. In fact, the way Heartbleed was presented by the team that discovered it is a model for how technology issues should be communicated to the public. Read More >>

security
How Secure are Your Favourite Websites?

Heartbleed is a scary thing. Aside from the violent-sounding name, the vulnerability in OpenSSL security protocols spans the entire internet and affects most of the sites we know, love, and use on a daily basis. Even outside of Heartbleed, not all security protocols are created equal. So how do you know who to trust? Read More >>

security
Credit Card-Reading Spy Camera Found in the NYC Subway

Credit card thieves seem to come up with a new way to steal your personal information every day. The latest ploy: a card-reading spy camera, hiding above the MetroCard machine. Read More >>

security
US Army Compares New Hacker School to "the Birth of the Air Force"

Over the next three years, the U.S. Army will be filling its brand new cyber warfare institute at West Point with the best and brightest hackers it can find. Not just hackers, however: the institute will bring together psychologists, lawyers, mathematicians—anyone who can help the country win the inevitable cyber war and save America. Read More >>

security
This Cartoon is the Simplest Explanation of Heartbleed Yet

You may have read some long explainers about how Heartbleed works, but this cartoon is the simplest description you'll see of how the bug works. Read More >>

android
Android Now Offers Routine Malware Surveillance for Your Phone

It's no secret that Android apps can get a little shifty, but having the freedom to explore that is part of what makes Android great. Now Google is helping you stay even safer by keeping a constant eye on whether or not any of your apps are doing anything they shouldn't be. Read More >>

security
How Heartbleed Works: The Code Behind the Internet's Security Nightmare

By now you've surely heard of Heartbleed, the hole in the internet's security that exposed countless encrypted transactions to any attacker who knew how to abuse it. But how did it actually work? Once you break it down, it's actually incredibly simple. And a little hilarious. But mostly terrifying. Read More >>

security
The Simple Security Measure That Could've Stopped Heartbleed Dead

We learned yesterday of a catastrophic bug, nicknamed "Heartbleed," that has critically threatened the security of some HTTPS sites since 2011. By some estimates, Heartbleed affects 2 out of 3 web servers on the Internet.1 Read More >>

Login
X

Don't have a Gizmodo UK account?