In "Exploding the Phone," Phil Lapsley writes an entertaining and educational history of the people who hacked the original phone networks. Lapsley talked to CNET about his book.
Thirty-eight years after the famous club had its first meetings, spawning Apple and many other companies, many of its members got together to share stories of the beginnings of the PC era.
NSA surveillance keywords are transformed into odd poetry with the NSA Haiku Generator.
A well-respected computer security reporter says he was the target of a con that sent an armed SWAT team to his front door.
Network uses phones running the "Ninja OS," which features innovative apps such as "BoozeFone," where people can exchange beverages using what I dubbed "booze networking."
National Security Agency Director Gen. Keith Alexander calls Defcon the "world's best cybersecurity community" and asks for their help.
A Defense Department document shows that the late Apple leader admitted to drug use, an arrest for an unpaid traffic ticket, and fears that his daughter might be kidnapped.
Today we're taking issue with the misuse of the word "hacked." With news stories about Stuxnet, PlayStation 3, and News of the World throwing around the term with no specific definition, we define exactly what it means to hack...at least according to the Computer Fraud and Abuse Act.
Famed hacker shows how easy it is for anyone, not just British tabloid journalists, to access a stranger's mobile phone voice mail.
It's our annual scare-the-bejesus out of ourselves episode, wherein we discuss all of the scary things that were announced and demonstrated at DefCon this year. Seriously, DefCon is way past phone phreaking and seriously into national security right now. Yikes. Also, new Apple jailbreaks are available, the BlackBerry doesn't pass Middle Eastern muster, and we've got the ultimate solution to Internet privacy concerns: data locavores.