All bookmarks770 Sports 28 Design 28 Music 28 Pocket Hits 2014 28 Psychology 25 Art 24 Startups 24 Football 24 Movies 23 Science 22 Productivity 22 Finance 21 Food 21 Career 20 Parenting 20 Education 19 Basketball 19 Current Events 19 Religion 18 Travel 18 Entertainment 17 Technology 17 Gender 17 Health 17 Photography 16 Recipes 15 Gaming 15 Leadership 15 Books 14 Baseball 14 History 14 Relationships 14 Cars 13 Fashion 13 Soccer 13 Business 13 Programming 13 Fitness 12 Space 12 Security 10 MH370 7 Home 7 DIY 7 Ferguson 5 World Cup 5 Ukraine Crisis 4
The Best Articles of the Year: Security
The Secret Life of Passwords
Howard Lutnick, the chief executive of Cantor Fitzgerald, one of the world’s largest financial-services firms, still cries when he talks about it.
Secrets, lies and Snowden's email: why I was forced to shut down Lavabit
My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation of surveillance equipment on my company's network.
How Russian Hackers Stole the Nasdaq
In October 2010, a Federal Bureau of Investigation system monitoring U.S. Internet traffic picked up an alert. The signal was coming from Nasdaq (NDAQ). It looked like malware had snuck into the company’s central servers.
Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It
The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it appear destined for success. In the days prior to Thanksgiving 2013, someone installed malware in Target’s (TGT) security and payments system designed to steal every credit card used at the company’s 1,797 U.S.
Everything Is Broken
Once upon a time, a friend of mine accidentally took over thousands of computers. He had found a vulnerability in a piece of software and started playing with it. In the process, he figured out how to get total administration access over a network.
Inside The Billion-Dollar Hacker Club
For this group of old friends, assembled for an impromptu reunion, the venue would feel familiar: an online chat room running on a secure private server.
The Ultra-Simple App That Lets Anyone Encrypt Anything
Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn’t figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video.
The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus
Boldizsár Bencsáth took a bite from his sandwich and stared at his computer screen.
The Internet’s Telltale Heartbleed
The cryptography expert Bruce Schneier, who has been writing about computer security for more than fifteen years, is not given to panic or hyperbole.
Advice from a Real Hacker: How to Create Stronger Passwords
People who know that I am a professional hacker often ask me what they can do to make their computers and personal information safe from people like me.
More The Best Articles of the Year: Security search results:
Handbook of Applied Cryptography
Intrusion Detection Systems with Snort
OWASP Top 10 for .NET Developers
oAuth Consumer Library
by John Kristian
How iD Logs in to OpenStreetMap