Hilton to replace hotel room key with mobile phone

Thumbnail for 351363

Source: ITP.net

Using Spreadsheets In Bioinformatics Can Corrupt Data, Changing Gene Names Into Dates

By Glyn Moody

Source: Techdirt

BitTorrent launches decentralised crypto-fied chat app

By Darren Pauli

Source: The Register

Security, Legal Groups Aim to Make Software Flaw Disclosure Easier

Source: eWeek

Who Funds Tor Project May Surprise You, or Maybe Not

Source: eWeek

Where Does Security Rank When Choosing Your New Language?

By Mitch Thomas

Source: The State of Security

Security Slice: The Problem with Password Solutions

By Eva Hanscom

Source: The State of Security

No patch yet for zero day in Symantec Endpoint Protection software driver

By IDGNS staff

Source: ITworld

Multipath TCP speeds up the Internet so much that security breaks

By Darren Pauli

Source: The Register

'Internet of Things' full of vulnerabilities

Thumbnail for 351082

By l33tdawg

Source: Hack In The Box

BitTorrent's Bleep messenger is a secure, decentralized chat platform

Thumbnail for 351087

By l33tdawg

Source: Hack In The Box

Hackers have compromised the once anonymous Tor network

Thumbnail for 351089

By l33tdawg

Source: Hack In The Box

Ford and GM sued for millions over CD-ripping tech in cars

Thumbnail for 351061

By l33tdawg

Source: Hack In The Box

Inside Citizen Lab, the “Hacker Hothouse” protecting you from Big Brother

Thumbnail for 351040

By Ars Staff

Source: Ars Technica

Attackers breach TOR Network to De-Anonymize Users of Hidden Services

Thumbnail for 351094

By Waqas

Source: HackRead