NSA surveillance keywords are transformed into odd poetry with the NSA Haiku Generator.
A well-respected computer security reporter says he was the target of a con that sent an armed SWAT team to his front door.
In "Exploding the Phone," Phil Lapsley writes an entertaining and educational history of the people who hacked the original phone networks. Lapsley talked to CNET about his book.
Thirty-eight years after the famous club had its first meetings, spawning Apple and many other companies, many of its members got together to share stories of the beginnings of the PC era.
Famed hacker shows how easy it is for anyone, not just British tabloid journalists, to access a stranger's mobile phone voice mail.
National Security Agency Director Gen. Keith Alexander calls Defcon the "world's best cybersecurity community" and asks for their help.
A Defense Department document shows that the late Apple leader admitted to drug use, an arrest for an unpaid traffic ticket, and fears that his daughter might be kidnapped.
Network uses phones running the "Ninja OS," which features innovative apps such as "BoozeFone," where people can exchange beverages using what I dubbed "booze networking."
Glaskowsky reports on the Vintage Computer Festival.
Today we're taking issue with the misuse of the word "hacked." With news stories about Stuxnet, PlayStation 3, and News of the World throwing around the term with no specific definition, we define exactly what it means to hack...at least according to the Computer Fraud and Abuse Act.