computer security

Bits: Tech Roundup: WikiLeaks Documents Point to Scourge of Cyberweapons

Bits: Tech Roundup: WikiLeaks Documents Point to Scourge of Cyberweapons

An iPhone streamed a Facebook Live feed of the lobby at Trump Tower in November.
WikiLeaks Reignites Tensions Between Silicon Valley and Spy Agencies

WikiLeaks Reignites Tensions Between Silicon Valley and Spy Agencies

A pedestrian walked by the Apple Store on Fifth Avenue in February 2016 in Manhattan, while a group of demonstrators protested F.B.I. efforts to force Apple to help access the iPhone of an attacker in
WikiLeaks Reignites Tensions Between Silicon Valley and Spy Agencies

WikiLeaks Reignites Tensions Between Silicon Valley and Spy Agencies

A pedestrian walked by the Apple Store on Fifth Avenue in February 2016 in Manhattan, while a group of demonstrators protested F.B.I. efforts to force Apple to help access the iPhone of an attacker in
WikiLeaks Reignites Tensions Between Silicon Valley and Spy Agencies

WikiLeaks Reignites Tensions Between Silicon Valley and Spy Agencies

A pedestrian walked by the Apple Store on Fifth Avenue in February 2016 in Manhattan, while a group of demonstrators protested F.B.I. efforts to force Apple to help access the iPhone of an attacker in
WikiLeaks Reignites Tensions Between Silicon Valley and Spy Agencies

WikiLeaks Reignites Tensions Between Silicon Valley and Spy Agencies

A pedestrian walked by the Apple Store on Fifth Avenue in February 2016 in Manhattan, while a group of demonstrators protested F.B.I. efforts to force Apple to help access the iPhone of an attacker in

Tech Tip: Questions About Mac Security and Google Password Prompts

You can link your mail accounts and social media services to Apple’s operating system for easy integration, but keep your passwords up to date.
Tech Tip: Questions About Mac Security and Google Password Prompts

Tech Tip: Questions About Mac Security and Google Password Prompts

You can link your mail accounts and social media services to Apple’s operating system for easy integration, but keep your passwords up to date.
Howard Schmidt, Cybersecurity Adviser to Two Presidents, Dies at 67

Howard Schmidt, Cybersecurity Adviser to Two Presidents, Dies at 67

Howard A. Schmidt speaking at the Sixth International Information Security Conference in Seoul, South Korea, in 2012.
Howard Schmidt, Cybersecurity Adviser to Two Presidents, Dies at 67

Howard Schmidt, Cybersecurity Adviser to Two Presidents, Dies at 67

Howard A. Schmidt speaking at the Sixth International Information Security Conference in Seoul, South Korea, in 2012.
Yahoo’s Top Lawyer Resigns and C.E.O. Marissa Mayer Loses Bonus in Wake of Hack

Yahoo’s Top Lawyer Resigns and C.E.O. Marissa Mayer Loses Bonus in Wake of Hack

Marissa Mayer, the chief executive of Yahoo, at a conference in San Francisco last year. An investigation found that lawyers and security staff failed to understand the significance of the hacking.
Yahoo’s Top Lawyer Resigns and C.E.O. Marissa Mayer Loses Bonus in Wake of Hack

Yahoo’s Top Lawyer Resigns and C.E.O. Marissa Mayer Loses Bonus in Wake of Hack

Marissa Mayer, the chief executive of Yahoo, at a conference in San Francisco last year. An investigation found that lawyers and security staff failed to understand the significance of the hacking.

F.C.C., in Potential Sign of the Future, Halts New Data Security Rules

The F.C.C. delayed data security rules requiring internet providers like AT&T and Comcast secure their customers’ data against hacking.

F.C.C., in Potential Sign of the Future, Halts New Data Security Rules

The F.C.C. delayed data security rules requiring internet providers like AT&T and Comcast secure their customers’ data against hacking.
That Cool Robot May Be a Security Risk

That Cool Robot May Be a Security Risk

A fashion contest in Tokyo last month featured Pepper robots. A report by IOActive cited security flaws in some of these kind of robots.
That Cool Robot May Be a Security Risk

That Cool Robot May Be a Security Risk

A fashion contest in Tokyo last month featured Pepper robots. A report by IOActive cited security flaws in some of these kind of robots.
Tech Tip: What to Do When Windows Updates Fail

Tech Tip: What to Do When Windows Updates Fail

Microsoft’s service for keeping Windows current with the latest system patches can have problems, but troubleshooting might help those updates install.

Tech Tip: What to Do When Windows Updates Fail

Microsoft’s service for keeping Windows current with the latest system patches can have problems, but troubleshooting might help those updates install.
What Are Your Rights if Border Agents Want to Search Your Phone?

What Are Your Rights if Border Agents Want to Search Your Phone?

Walking from Mexico to the United States at the border crossing in San Ysidro, Calif.