The new and cheap anonymizing device, Proxyham, has been axed and its DEF CON talk cancelled. Was the firm hit with a gag order, or was it just hype to begin with?
By overcooking your computer's memory, you may be able cause data corruption. But can you turn that into a deliberate security exploit? Google's Project Zero researchers say, "Yes!"
If product X suddenly wants you to install product Y as a "recommended extra", is that a good thing or a bad one? In the latest brouhaha, X = torrent client and Y = cryptocoin miner...