- Netflix open-sources security incident management tool
- Sally Beauty investigates possible second card breach
- Putting security at board level helps Bendigo Adelaide Bank smooth its risk-management overhaul
- Rombertik malware destroys computers if detected
- Defence key to living in modern threat environment - Symantec
nsa - News, Features, and Slideshows
nsa in pictures
Some of the world's best known cryptographers veterans of the crypto wars of the 1990s say government access to encryption keys is still a bad idea, but is an issue that will never go away because it's something intelligence agencies crave.
Meet Jesse Nunez, an avid opponent of bloatware on smartphones.
According to Richard Stallman, godfather of the free software movement, Facebook is a "monstrous surveillance engine," tech companies working for patent reform aren't going nearly far enough, and parents must lobby their children's schools to keep data private and provide free software alternatives.
A U.S. Senator is questioning why the Federal Communications Commission (FCC) approved of a controversial cell phone surveillance device that both federal and state law enforcement agencies are using to track suspects, often without court orders to do so.
Australian Privacy Commissioner Timothy Pilgrim is investigating reports about SIM card encryption keys – including those of SIM cards used in Australia – having been allegedly hacked by United States and United Kingdom intelligence agencies during 2010 and 2011.
If there's a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard (GnuPG), a pillar of the open source software ecosystem.
As part of the NSA's program to certify commercial off-the-shelf technology for use inside the agency, mobile devices from Samsung and Boeing have been cleared for use by NSA employees.
A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
The NSA is spending some $80 million in basic research on quantum computing, money that may ultimately help commercialize quantum computing for the private sector.
- Cebit 2015: Aussie politicos claim ownership over knowledge economy
- AMEX Global Business Travel adopts new Cloud-based strategy
- INTERVIEW: AOL's Digital Prophet, Shingy, gives us his predictions for 2015
- Australia’s router market hits a downturn: IDC Australia
- Equinix to supply private managed connections to Microsoft Office 365
- Panel: Avoid social and you risk missing business growth opportunities
- 5 lessons from AMP on driving disruptive digital thinking
- Coles trials voice-recognition gizmo Hiku
- How Telstra is applying data analytics to customer experience
- Property hunters get real-time context with Domain app and Google Now integration