- Cybercrime by Wire Fraud – What’s Covered?
- Popular Belkin Wi-Fi routers plagued by unpatched security flaws
- Intel says GPU malware is no reason to panic, yet
- App security suffering as survey finds that most developers still aren't building for mobile
- Board-level cyber-resilience must look far and wide – and right up to the top
nsa - News, Features, and Slideshows
nsa in pictures
The U.S. National Security Agency will lose access to the bulk telephone records data it has collected at the end of November, the Office of the Director of National Intelligence announced Monday.
The Internet is a pit of epistemological chaos. As Peter Steiner posited -- and millions of chuckles peer-reviewed -- in his famous New Yorker cartoon, there's no way to know if you're swapping packets with a dog or the bank that claims to safeguard your money. To make matters worse, Edward Snowden has revealed that the NSA may be squirreling away a copy of some or all of our packets, and given the ease with which it can be done, other countries and a number of rogue hacker groups may very well be following the NSA's lead.
Just as the industry is becoming more comfortable with SDNs, the NSA says it's using them too.
Some of the world's best known cryptographers veterans of the crypto wars of the 1990s say government access to encryption keys is still a bad idea, but is an issue that will never go away because it's something intelligence agencies crave.
Meet Jesse Nunez, an avid opponent of bloatware on smartphones.
If there's a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard (GnuPG), a pillar of the open source software ecosystem.
As part of the NSA's program to certify commercial off-the-shelf technology for use inside the agency, mobile devices from Samsung and Boeing have been cleared for use by NSA employees.
A funny thing is happening in the wake of the <a href="http://www.computerworld.com/article/2490179/security0/security0-the-snowden-leaks-a-timeline.html">Edward Snowden NSA revelations</a>, the infamous <a href="http://www.computerworld.com/article/2601905/apple-icloud-take-reputation-hits-after-photo-scandal.html">iCloud hack of celebrity nude photos</a>, and the hit parade of customer data breaches at <a href="http://www.computerworld.com/article/2490637/security0/target-finally-gets-its-first-ciso.html">Target</a>, <a href="http://www.computerworld.com/article/2844491/home-depot-attackers-broke-in-using-a-vendors-stolen-credentials.html">Home Depot</a> and the <a href="http://www.computerworld.com/article/2845621/government/us-postal-service-suffers-breach-of-employee-customer-data.html">U.S. Postal Service</a>. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
The NSA is spending some $80 million in basic research on quantum computing, money that may ultimately help commercialize quantum computing for the private sector.
- VMworld 2015: VMware’s vision is to transform the datacentre, says Eschenbach
- Superloop reports first financial figures since ASX float
- Microsoft APC 2015: Gartner's Tiffani Bova - predicting the partner of 2020
- Microsoft APC 2015: CVP Phil Sorgen: “Partnering is in our DNA”
- Trend Micro expands relationship with VMware
- Myer targets customers through digital and data in $600m transformation agenda
- Economist: Why it's time to re-think marketing in a customer-led economy
- Why brands are using Marketo to leverage digital transformation
- Xero CMO reveals why we need to automate to achieve greatness
- What the new breed of DMPs mean for marketers