Malware Attacks by Syrian Pro-Government Hackers Are on the Rise

The Syrian Electronic Army isn’t the only pro-Assad group using hacking attacks.
al-assad

Target Says PIN Numbers Among Data Stolen in Breach

They were still encrypted, the store says.
target_redcard

Evernote CEO Phil Libin on Turning Loyal Users Into Paying Customers

In the second part of a Q&A, the company’s founder also talks about its security breach earlier this year, plans for an IPO and new data centers, and why good problems are worse than bad problems.
phil_libin

The One Big Question About RSA and Its Relationship With the NSA

The first questions about a problematic encryption method arose in 2007, and for six years it appeared that RSA did nothing to address them.
rsa_securID

Talk of an RSA Boycott Grows After Reports It Colluded With the NSA

A well-known security researcher says he won’t speak at next year’s RSA conference after reports allege that the company worked with the NSA to allow back doors into encryption products.
computer_security

The Washington Post Is Hacked Again, and Again China Is Suspected

It’s the third time in as many years the paper’s systems have been breached.
hacked380

In Lawsuit, U.S. May Have to Prove Why It Needs Phone Records Collection Program

A judge challenges the government to prove that investigators have used it to fend off imminent terrorist attacks.
NSA-Logomag380

Chinese Hackers Used Fake Syrian News and Carla Bruni Pics to Attack Foreign Embassies

Another reason to be careful what you click.
hacked

Stealth Networking Startup VIPtela Raises $33 Million From Sequoia

Another secretive startup working on software-defined networks.
moneybags

Siri Gets Serious, Microsoft Gets Its Mojo Back and Everything Gets Encrypted in 2014

Annual predictions for the year ahead in tech from analyst Mark Anderson.
crystal_ball_prediction

A New Worm Proves That the Internet of Things Is Vulnerable to Attack

How Too Many SMS Messages Can Shut Down Your Nexus Phone

How Somebody Forced the World’s Internet Traffic Through Belarus and Iceland

How the NSA May Be Tapping Yahoo’s and Google’s Fiber Optic Cables

Apple’s Safari Made Up Most Mobile Browser Traffic in Q2

U.S. Intelligence Chief Defends Attempts to Break Tor Anonymity Network

Why the NSA Hates Tor, the Network That Protects Internet Anonymity

Adobe Discloses Security Breach Affecting Nearly Three Million Customers

Seven Questions About Security for Kleiner Perkins’ Ted Schlein

LinkedIn Calls Email Hacking Charges False

Police in New York Really Want You to Download iOS 7

FireEye Takes Off as Shares Rise 80 Percent in IPO Debut

CrowdStrike Lands $30 Million Series B Led by Accel Partners

How the Attack on NY Times and Twitter Domains Could Have Been Worse

Syrian Electronic Army Says Attack on New York Times Is Over