Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
The FBI Can Bypass Encryption: Why Cyber Security is a Magic Act
How to Leak to The Intercept
Leaking can serve the public interest, fueling revelatory and important journalism. Here are instructions for how to leak safely.
Steve Gibson's campaign against Internet spyware used by companies to extract information from Internet users' computers without their knowledge or consent.
Passphrases That You Can Memorize - But That Even the NSA Can't Guess
A passphrase is like a password, but longer and more secure. In essence, it's an encryption key that you memorize. Once you start caring more deeply about your privacy and improving your computer secu...
Popular Security Software Came Under Relentless NSA and GCHQ Attacks
Fishman, Andrew; Marquis-Boire, Morgan
The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate n...
Preparing for a Digital 9/11
In recent years, in one of the more dangerous, if largely undiscussed, developments of our time, the Bush and then Obama administrations have launched the first state-planned war in cyber space. First...
With Virtual Machines, Getting Hacked Doesn't Have To Be That Bad
Lee explains how to install and use a virtual machine, a fake computer running inside the real computer.
The Motherboard Guide to Not Getting Hacked
Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? Motherboard Staff have answers on how to protect yourself. This is Motherb...
US was 'key player in cyber-attacks on Iran's nuclear programme'
Obama reported to have approved bid to target Tehran's nuclear efforts
Beaumont, Peter; Hopkins, Peter
Fresh light is shed on the rapid development of US cyberwarfare capability and reveal its willingness to use cyber weapons offensively to achieve policies.
Watch your attachments: Microsoft Office bug lets hackers take over computers
A dangerous new security vulnerability has been discovered in Microsoft's Office software, threatening to hijack users of virtually every existing version of Windows. The bug in question affects progr...
Why you shouldn't trust Geek Squad ever again
The government reportedly pays Geek Squad technicians to dig through your PC
The Orange County Weekly reports that the company's repair technicians routinely search devices brought in for repair for files that could earn them $500 reward as FBI informants. That, ladies and gen...