For a phone with mid-tier hardware, the Blackphone punches high with nearly $900 worth of security and privacy tools. Here's what using the phone looks like.
While Blackphone sales are off to a lukewarm start, our hands-on with the privacy-obsessed smartphone finds that it simplifies staying secure on the go.
Embattled email guru Ladar Levison updates the DefCon crowd on encrypted email project DarkMail and asks for help from the hacker faithful to get what may be his final email project done.
At the Defcon hackers convention, a security research group proposes an automobile cyber safety rating system that could go far beyond hacking cars.
At the hacker conference Black Hat, Yahoo's new security honcho promises that Yahoo Mail will be encrypted end-to-end in 2015.
Experts say the reported heist of 1.2 billion account credentials is legit, but caution that for most people there's little they can do -- or should be worried about.
Security experts gather again in Vegas to show off and debate the latest in hacks and flaws, focusing this year on the latest risks facing Net-connected devices.
The good ol' days of chummy games of "Spot the Fed" at Defcon are finished as hackers and security entrepreneurs plan next steps in the wake of government spying revelations.
Brian Muirhead of NASA's Jet Propulsion Lab tells security professionals at Black Hat that failure is not an option when taking big risks, but offers tips on avoiding it.
Tor's famous for anonymizing your Internet activities and infamous for being a pain to use. Debuting at Black Hat, the Tortilla tool smooths out some of the global network's rough edges.
The head of the NSA faces a tough audience as he appeals to hackers and security professionals at Black Hat 2013 to help the U.S. government build better spying tools.
The security researcher, who was expected to demonstrate newly-discovered pacemaker vulnerabilities at Black Hat next week, made headlines in 2010 when he hacked an ATM in front of an audience.