- Large scale attack hijacks routers through users' browsers
- Minecraft used as cover to push Android scareware apps on Google Play
- Android's reset function fails to delete data from Samsung and HTC smartphones
- Hacked Adult Friend Finder database offered for $17,000
- Significant virtual machine vulnerability has been hiding in floppy disk code for 11 years
nsa - News, Features, and Slideshows
nsa in pictures
Some of the world's best known cryptographers veterans of the crypto wars of the 1990s say government access to encryption keys is still a bad idea, but is an issue that will never go away because it's something intelligence agencies crave.
Meet Jesse Nunez, an avid opponent of bloatware on smartphones.
According to Richard Stallman, godfather of the free software movement, Facebook is a "monstrous surveillance engine," tech companies working for patent reform aren't going nearly far enough, and parents must lobby their children's schools to keep data private and provide free software alternatives.
A U.S. Senator is questioning why the Federal Communications Commission (FCC) approved of a controversial cell phone surveillance device that both federal and state law enforcement agencies are using to track suspects, often without court orders to do so.
Australian Privacy Commissioner Timothy Pilgrim is investigating reports about SIM card encryption keys – including those of SIM cards used in Australia – having been allegedly hacked by United States and United Kingdom intelligence agencies during 2010 and 2011.
If there's a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard (GnuPG), a pillar of the open source software ecosystem.
As part of the NSA's program to certify commercial off-the-shelf technology for use inside the agency, mobile devices from Samsung and Boeing have been cleared for use by NSA employees.
A funny thing is happening in the wake of the Edward Snowden NSA revelations, the infamous iCloud hack of celebrity nude photos, and the hit parade of customer data breaches at Target, Home Depot and the U.S. Postal Service. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
The NSA is spending some $80 million in basic research on quantum computing, money that may ultimately help commercialize quantum computing for the private sector.
- Exclusive Networks APAC posts bumper growth in first quarter
- Ingram Micro launches professional and training services for Aussie resellers
- Symantec's Holtzhausen to head Veritas channel business across APJ
- Barracuda and Aerohive partner for BYOD security
- Cloud back-up is vital for reseller and MSP profitability: CloudBerry Lab
- Why optimisation is the name of the game at First
- Video, mobile show strong growth in IAB's Q1 online advertising report
- Twitter offers marketers objective-based advertising programs
- Coming to Firefox: Ads based on your browsing history
- Woolworths customer leader, Jess Gill, departs, following CMO out the door