Search Results For: nsa.aspx

During a speech to the Bipartisan Policy Center in Washington, DC on cybersecurity, former NSA and CIA chief Michael Hayden confessed that if whistleblower Edward Snowden is captured by the US and brought back for trial, cyber-attacks by his defenders can be expected. While I find it hard to agree with most of what... Read more...
Whether you consider NSA leaker Edward Snowden to be a hero or a traitor, one thing can't be disputed: he's now famous the world over. Sometimes, that can result in some interest things, like being worked into a comedian's routine, being offered jobs or even becoming the star of your very own video game. All three... Read more...
We reported that the secret and top secret agencies of several countries including Australia, the UK, and the U.S. had banned China-based Lenovo computers for fears of spying. Allegedly, the Lenovo machines could have backdoor access built into the hardware which would therefore allow Chinese hackers to access those... Read more...
One of the contentious issues that's swirled around the NSA since whistleblower Edward Snowden began leaking information on the organization's capabilities is exactly what it can -- or can't -- do. Snowden has stated that as a contractor with Booz Allen Hamilton, "I, sitting at my desk, certainly had the authorities... Read more...
A new report (albeit from unnamed industry sources, not Edward Snowden) alleges that the government has used the broad powers granted it by the Patriot Act to demand broad information about a user's passwords, website security, and even encryption information from service providers. The benefits of having this type of... Read more...
Sometimes, it’s hard to tell the difference between someone being stupid and being evil. According to Justin Elliott of ProPublica, writing in the Huffington Post, the NSA responded to his freedom of information request with a stonewall. Elliott said he was asking for emails between NSA employees and the... Read more...
We've covered the NSA revelations and subsequent government petitions at some length, but here's a new twist to the story of the government's pervasive monitoring program -- a view of the activity from an ISP's perspective. According to Pete Ashdown, the CEO of XMission, a Utah ISP, the company received its first FISA... Read more...
BlackBerry has big on security, but according to the findings of German site GeekHeim, the Canadian company has a big, nasty security flaw in its own ranks. Apparently, when you set up an email account using BlackBerry 10’s email client, you’re unwittingly sharing your login credentials with BlackBerry... Read more...
For months, there've been questions regarding just how secure Skype's encryption was. After Microsoft bought the VOIP company it began moving to a more centralized node structure that made it easier to scale the product but at the cost of intrinsic security. Now, it seems such concerns were valid -- new leaked... Read more...
It’s deeply disconcerting, to say the least, that the NSA has been able to extract data about U.S. citizens from Internet companies using the secret (until recently) PRISM program. Because all of those companies likely handle data a little differently, it’s hard to say how much information the government... Read more...
It appears that the Swiss have turned a reputation for having the most secure banks in the world into a possible refuge for corporations trying to keep data from the spying eyes of the NSA. The NSA’s PRISM program used the shadowy Foreign Intelligence Surveillance Act (FISA) and a secret court to request data on... Read more...
In an effort to offer Internet users some transparency and to deflect negative attention from recent revelations that big companies have been sharing user data with the government via the National Security Agency's (NSA) PRISM program, Google is seeking permission from the Foreign Intelligence Surveillance Court to... Read more...
Now that the NSA has apparently assented to allow companies from which it culled personal user data to post some numbers about how many requests were made, more companies are disclosing that information. Facebook and Microsoft posted some numbers this weekend, and now Yahoo! has some as well. According to a post... Read more...
More information is coming out regarding the NSA’s PRISM program wherein the agency has been requesting/demanding data on U.S. citizens from major Internet companies. (We have further reading on the subject here, here, and here.) After adamant declarations from some companies, perhaps most notably Facebook--Mark... Read more...
Apple co-founder Steve Wozniak, personality-wise, was the yin to Steve Jobs yang, and the effervescent and jovial Woz is typically an entertaining fellow, always good for a fresh perspective on mobile devices or other technology. Not so the other day in the airport. FayerWayerTV snagged some one-on-one time with Woz as he was waiting for his... Read more...
In the wake of the Washington Post leaks, there's been a great deal of discussion over how, exactly, companies like Google share data with the government. The original report implied that the NSA has direct datacenter access and either grabs the information directly  from Google or was copying and analyzing... Read more...
Yesterday, we talked about PRISM, the NSA's tool for spying on all foreign Internet traffic routed through the United States. Today, we've got news a fresh leak and another troubling aspect of the NSA's spying capabilities. The newly revealed program, dubbed Boundless Informant, is an analysis tool that creates heat... Read more...
This sounds like the definition of a slippery slope: According to Reuters, the U.S. government is expanding its Internet traffic-scanning cybersecurity program to include more private sector workers, such as those at large banks, utility companies, and “key transportation” companies, and the NSA will use... Read more...
Prev 1 2 3 4