Computer & Internet Security

Computer surveillance and security covers a wide range of ways to keep you and your information safe. Learn about firewalls, zombie computers, hackers and workplace surveillance.


The guys at Stuff They Don't Want You To Know talk about whether you can really delete your internet history — and why you want to.

Active defense techniques are changing how companies fight back against cybercrooks.

2016 was memorable for a whole lot of reasons, and one of them was the massive amount of data stolen.

It’s sweet to have a personal assistant like Amazon’s Alexa do your bidding. Except when it does something you didn’t anticipate, like order an adorable dollhouse.

Malicious software is threatening the safety of some major cloud hosting services. Here's what a team of researchers is doing to help kick the bad guys out.

To thwart hackers from intercepting wireless signals, engineers send a signal through the body, from a smartphone fingerprint scanner to a 'smart lock.'

Researchers have developed experimental versions of a device that could send encrypted messages impossible to intercept or decipher.

Cybersecurity experts recently discovered an insidiously clever piece of malware that went unnoticed for half a decade. The name? ProjectSauron.

You know how you can't really disconnect your PC's fan unless you want a hot mess on your hands? Turns out that fan could serve a more nefarious purpose, too.

Trolls are everywhere these days, driving people off Twitter and wreaking havoc online. They also have specific personality traits that the general population doesn't.

And the FBI already has said it’ll help other law enforcement agencies with locked phones.

Google attributed some unflattering changes in a Ukrainian newspaper's Russian translation to machine error. But some security experts say that's impossible.

As these devices are finally made legal in California, here comes another worry: Their Bluetooth connection can be exploited.

The short answer is yes. The long answer? Some people do it for mischief, others for criminal purpose, and even governments are in on the game.

If you've spent any time online, you've probably run into someone who seems to want nothing more than to stir up trouble and make others miserable. What if a program could find and weed out these trolls?

Online harassment seems to know no bounds, with new opportunities for meanness evolving all the time. Ever heard of dogpiling or doxing?

Remember that crazy video you made with your friends years ago? Yes, you do, but you also wish it wasn't the first thing that pops up in a Google search of your name. Well, rejoice! There's a way to get it out of Google.

Do you know what you're doing when you're "dropping dox" on somebody? It's called "doxxing," and while it's technically not illegal, it's probably not a very nice thing to do to someone.

Viruses. Malware. Spyware. Add to the seemingly ever-growing list of things we have to worry about when dealing with computers one more factor: zero-day vulnerability. So just what the heck is it, and how does it put us at risk?

After attacks on U.S. companies, government entities and news organizations, a cybersecurity firm traced the hacks back to a single 12-story building on the outskirts of Shanghai. Why does this location raise more questions than answers?

CISPA is a proposed cybersecurity bill that has fervent supporters and opponents. What makes some people feel it's a dangerous piece of legislation, and what are its potential benefits?

You've probably heard of the hacktivist group known as Anonymous, but do you really know what motivates the group’s actions or how members organize their initiatives?

The Protect IP Act has the seemingly simple and noble goal of stopping electronic piracy. But its foes say the bill is fundamentally flawed. What would the new law do and how would it work?