Arstechnica

Ransomware takes over your computer, demands money

Oct 17, 2013

The horrifying feeling that you get when you see that you have a virus just got more personal with the...

Dexter is dangerous for computers, too

Oct 16, 2013

He isn't just out there hacking people up on the popular television series Dexter. Now he's chopping up computers and...

Gaming college still going strong after a quarter of a century

Oct 15, 2013

If you really want to learn how to build video games, the first gaming college in North America just hit...

You’re email is safer in the US than Europe

Oct 14, 2013

With so many allegations and news stories about American email being vulnerable to the watchful eye of Big Brother, many...

IT for the US government has always been awful

Oct 13, 2013

This isn't a trend. It's not a strange series of unrelated events. The way the US government handles its IT...

Lavabit lays out its case

Oct 12, 2013

The US government has beef with Edward Snowden and they're willing to take any measures necessary to make that happen...

WhatsApp messages may be hackable

Oct 10, 2013

Accusations are flying that the popular instant messaging service WhatsApp may have very basic vulnerabilities when sent via WiFi. A...

Password cracking is getting ridiculous

Oct 9, 2013

Your password is not really that secure. Unless you have a 22-character randomized password (that won't even work in many...

The future of connected cars

Oct 6, 2013

Cars are trying to be as connected as possible but the automakers aren't keeping pace with the technology. Here's a...

Samsung Galaxy Gear is a not-so-smart watch

Oct 6, 2013

The promise of the upcoming smartwatch phenomenon is great enough to bring all of the major gadget companies to the...

How they nabbed Ross William Ulbricht

Oct 2, 2013

Sloppiness, ego, and money eventually brought down the criminal mind that merged a high tech economy with low tech crime....

Are Samsung’s Note 3 benchmarks faked?

Oct 1, 2013

Benchmarking is supposed to be the unbiased method for finding strengths and weaknesses in gadgets, particularly with mobile devices like...