- Flintshire Council deploys encrypted email using Egress Switch
- DDoS top security fear as businesses weigh reputational damage risk
- Stuxnet, Snowden and Sony: Why we've passed the cyber security tipping point
- Adobe opens bug reporting program, but don't report Flash and don't expect cash
- Engineers, not users, to blame for security shortfalls: Cheswick
nsa - News, Features, and Slideshows
nsa in pictures
A U.S. Senator is questioning why the Federal Communications Commission (FCC) approved of a controversial cell phone surveillance device that both federal and state law enforcement agencies are using to track suspects, often without court orders to do so.
Australian Privacy Commissioner Timothy Pilgrim is investigating reports about SIM card encryption keys – including those of SIM cards used in Australia – having been allegedly hacked by United States and United Kingdom intelligence agencies during 2010 and 2011.
The Equation Group's ability to reprogram hard-drive firmware leaves corporate security pros unable to trust the devices because they can't tell whether disks have been compromised or not.
Malware intentionally created by the U.S. National Security Agency to infect personal computer hard disk drives (HDDs) and solid-state drives (SSDs) cannot be detected by antivirus programs.
The Equation cyberespionage group that used tools similar to those deployed in the past by U.S. intelligence agencies appears to have targeted Macs as well as Windows PCs, Moscow-based Kaspersky Lab said yesterday.
As part of the NSA's program to certify commercial off-the-shelf technology for use inside the agency, mobile devices from Samsung and Boeing have been cleared for use by NSA employees.
A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
The NSA is spending some $80 million in basic research on quantum computing, money that may ultimately help commercialize quantum computing for the private sector.
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
- Fastway marketing chief: Making the switch from B2B to consumer connections
- How HelloFresh's CMO uses a surprising tool to bring data closer to the business
- B2B marketers splurging on content and digital; struggling with ROI
- ADMA announces new board changes
- CMO Interview: How McDonald's is putting customer centricity back on the menu