Results 1 - 10 of about 869:

Luke O'Brien / Fortune:
Profile of Will Ackerly, ex-NSA security architect and founder of email encryption firm Virtru   —  Could this ex-NSA hotshot protect your email from hacking?  —  One morning in June 2013, Will Ackerly opened his laptop in his Washington, D.C., apartment and began to worry.
Sep 28, 2015, 9:25 AMIn context
Glyn Moody / Ars Technica UK:
EU-US data flows using “Safe Harbour” may be illegal because of NSA spying   —  Just how safe is Safe Harbour? (credit: Elizabeth du Toit)  —  The “Safe Harbour” framework—which is supposed to ensure data transfers from the EU to the US are legal under European data privacy laws …
Sep 23, 2015, 7:05 AMIn context
Sean Gallagher / Ars Technica:
Improved Simplocker Android malware disguises as an NSA app, has infected tens of thousands of devices using XMPP   —  Android ransomware uses XMPP chat to call home, claims it's from NSA  —  Improved Simplocker lurks disguised as legitimate Flash or video player app.
Sep 3, 2015, 10:15 AMIn context
Andy Greenberg / Wired:
Why It's Hard to Sue the NSA: You Have to Prove It Spied on You   —  Here's a big problem with secret spying programs in the US: To dismantle them with a lawsuit, someone has to prove that their privacy rights were infringed.  And that proof is almost always a secret.
Aug 30, 2015, 9:30 AMIn context
Lawrence Hurley / Reuters:
US court of appeals for DC Circuit throws out ruling that would have blocked NSA's phone metadata collection   —  U.S. court rules for government over NSA metadata collection program  —  A U.S. appeals court on Friday threw out a judge's ruling that would have blocked the National Security Agency …
Aug 28, 2015, 11:20 AMIn context
Germany's domestic intelligence agency BfV got XKeyscore software from NSA in exchange for German surveillance data   —  A Dubious Deal with the NSA  —  Internal documents show that Germany's domestic intelligence agency, the BfV, received the coveted software program XKeyscore from the NSA - and promised data from Germany in return.
Aug 27, 2015, 8:05 AMIn context
Aug 15, 2015, 1:35 PMIn context
Sean Gallagher / Ars Technica:
Adapted OwnStar MITM Wi-Fi attack can grab the virtual keys of BMW, Mercedes, Chrysler cars through a vulnerability in RemoteLink mobile app   —  OwnStar Wi-Fi attack now grabs BMW, Mercedes, and Chrysler cars' virtual keys  —  Using SSL proxy, attack decrypts user data, allowing remote access to vehicle.
Aug 14, 2015, 12:20 PMIn context
Lauren Walker / Newsweek:
NSA says it will stop accessing historical metadata collected under Section 215 of the Patriot Act on Nov. 29   —  NSA to Stop Accessing ‘Historical Metadata’ on Nov. 29  —  On November 29, 2015, the National Security Agency (NSA) will stop accessing “historical metadata” …
Jul 27, 2015, 5:00 PMIn context
The Intercept:
How the NSA's XKEYSCORE system for collecting and searching Internet data works   —  A Look at the Inner Workings of NSA's XKEYSCORE  —  Second in a series.  Part 1 here.  —  The sheer quantity of communications that XKEYSCORE processes, filters and queries is stunning.
Jul 4, 2015, 10:25 PMIn context

Sponsor Posts

Explore 3 futuristic Microsoft hardware labs  —  Explore a few of Microsoft's mind-blowing hardware labs, where a brilliant, diverse and cross-disciplinary cast of scientists make essential contributions to devices of today and tomorrow.
CEO Fraud: A First Hand Encounter  —  “CEO Fraud” is a sophisticated social engineering attempt to swindle money from companies — and it's working.  The FBI reports that over 7,000 victims have lost $750 million in the last 2 years from this scam.
It's All About Relationships When Selling Your Startup  —  What is actually required for a startup to get to an M&A?  While the popular image may be Facebook buying Instagram over one weekend, that's not how it usually happens.
Connect project management and issue tracking with our Task and Bug Linking feature  —  When it comes to building and distributing software, both development and testing go hand in hand.