hackers hackers

Apple's Philip Schiller unveiled the Face ID feature in September. Less than a week after the iPhone X was released, a Vietnamese security firm said it had cracked Face ID using a specially made mask. Justin Sullivan/Getty Images hide caption

toggle caption
Justin Sullivan/Getty Images

Security Firm Says Extremely Creepy Mask Cracks iPhone X's Face ID

  • Download
  • <iframe src="https://www.npr.org/player/embed/563741014/563894867" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

While the government dodged a bullet this time by avoiding the latest malware attack, experts say its systems are still vulnerable. Intrepid00/Flickr hide caption

toggle caption
Intrepid00/Flickr

Federal Computers Dodge Global Malware Attack ... This Time

  • Download
  • <iframe src="https://www.npr.org/player/embed/529518708/529550343" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

The official FBI seal is seen on an iPhone camera screen outside the agency's headquarters. With help from a third party, the FBI managed to unlock the iPhone used by one of San Bernardino shooters. Chip Somodevilla/Getty Images hide caption

toggle caption
Chip Somodevilla/Getty Images

The Next Apple-FBI Question: Who Can Know How The iPhone Was Hacked?

  • Download
  • <iframe src="https://www.npr.org/player/embed/474701925/474788365" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

Rami Malek plays genius hacker Elliot Alderson in Mr. Robot. David Giesbrecht/USA Network hide caption

toggle caption
David Giesbrecht/USA Network

Vigilante Computer Geeks Reign In The Addictive 'Mr. Robot'

  • Download
  • <iframe src="https://www.npr.org/player/embed/434872326/434938866" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

Dmitri Alperovitch, co-founder of the cybersecurity startup CrowdStrike, says his company is building stockpiles of intelligence about potential hacking groups. Keith Bedford/Reuters/Landov hide caption

toggle caption
Keith Bedford/Reuters/Landov

Hygiene, Honey Pots, Espionage: 3 Approaches To Defying Hackers

  • Download
  • <iframe src="https://www.npr.org/player/embed/386669799/386758854" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript