Items tagged with NSA

For months, there've been questions regarding just how secure Skype's encryption was. After Microsoft bought the VOIP company it began moving to a more centralized node structure that made it easier to scale the product but at the cost of intrinsic security. Now, it seems such concerns were valid -- new leaked... Read more...
It’s deeply disconcerting, to say the least, that the NSA has been able to extract data about U.S. citizens from Internet companies using the secret (until recently) PRISM program. Because all of those companies likely handle data a little differently, it’s hard to say how much information the government... Read more...
I'm not sure we needed another example of just how opportunistic malware creators can be, but thanks to Android.AntiObscan, we got one. This is a piece of malware that's been floating around the Web recently that mimics Jay-Z's brand-new album app, Magna Carta Holy Grail. Weeks before its launch, this album hit the... Read more...
It appears that the Swiss have turned a reputation for having the most secure banks in the world into a possible refuge for corporations trying to keep data from the spying eyes of the NSA. The NSA’s PRISM program used the shadowy Foreign Intelligence Surveillance Act (FISA) and a secret court to request data on... Read more...
Now that the NSA has apparently assented to allow companies from which it culled personal user data to post some numbers about how many requests were made, more companies are disclosing that information. Facebook and Microsoft posted some numbers this weekend, and now Yahoo! has some as well. According to a post... Read more...
More information is coming out regarding the NSA’s PRISM program wherein the agency has been requesting/demanding data on U.S. citizens from major Internet companies. (We have further reading on the subject here, here, and here.) After adamant declarations from some companies, perhaps most notably Facebook--Mark... Read more...
Apple co-founder Steve Wozniak, personality-wise, was the yin to Steve Jobs yang, and the effervescent and jovial Woz is typically an entertaining fellow, always good for a fresh perspective on mobile devices or other technology. Not so the other day in the airport. FayerWayerTV snagged some one-on-one time with Woz as he was waiting for his... Read more...
In the week since word of the NSA's Boundless Informant and Prism programs leaked online, there's been a great deal of concern over to what degree various companies cooperated with the NSA's requests. Some companies, like Google, have pointed to their repeated requests for greater transparency. Twitter, of course, is... Read more...
In the wake of the Washington Post leaks, there's been a great deal of discussion over how, exactly, companies like Google share data with the government. The original report implied that the NSA has direct datacenter access and either grabs the information directly  from Google or was copying and analyzing... Read more...
Yesterday, we talked about PRISM, the NSA's tool for spying on all foreign Internet traffic routed through the United States. Today, we've got news a fresh leak and another troubling aspect of the NSA's spying capabilities. The newly revealed program, dubbed Boundless Informant, is an analysis tool that creates heat... Read more...
There have been two major leaks this past week that we want to talk about. First, news that Verizon turns over all phone call metadata -- the numbers called, dialed, and the duration of the phone call in question -- to the NSA. Second, news that the NSA has agreements with major tech companies, including Apple... Read more...
This sounds like the definition of a slippery slope: According to Reuters, the U.S. government is expanding its Internet traffic-scanning cybersecurity program to include more private sector workers, such as those at large banks, utility companies, and “key transportation” companies, and the NSA will use... Read more...
Yesterday, the newly minted head of the United States' Cyber Command team and NSA head General Keith Alexander told assembled lawmakers that the US has created offensive cyberwarfare divisions designed to do far more than protect US assets from foreign attacks. This is a major change in policy from previous public... Read more...
The National Sheriffs' Association has announced it supports mandatory logging provisions incorporated into a proposed federal law that would require ISPs to store all customer data for 18 months. The bill (HR 1981) is intended to amend title 18 of the USC and is known as the "Protecting Children From Internet... Read more...
Using an old browser?  If you're planning to use PayPal, you might consider updating.PayPal, one of the brands most spoofed in phishing attacks, is working on a plan to block its users from making transactions from Web browsers that don't provide anti-phishing protection.The eBay-owned company, which runs a Web-based payment system that... Read more...
The Sectera Edge was developed under the NSA Secure Mobile Environment/Portable Electronic Device program (SME PED) and will eventually be supplied to the DOD and Homeland Security.  It will be able to switch between the government's Secret Internet Protocol Router Network (SIPRNet) and Non-classified Internet Protocol Router Network... Read more...
So, you think you have the most impressive home office workstation this side of the galaxy? Before you say yes, you have to see what Stefan Didak set up in his home.  Up to 9 screens, numerous machines, tons of network equipment, storage galore, and even an Amiga 1000 thrown in for good measure.... Read more...
What do you get when you mix a golden P4 sample with a fully volt-modded Asus P5B and a vat of liquid nitrogen? Yup, you guessed it! Some SERIOUS overclocking. And we mean SERIOUS. A couple of fellow Italianos recently broke the 8GHz barrier and have the evidence posted up in the XtremeSystem's forum.... Read more...
In an effort to help clarify some marketing terms that have been thrown around in terms of LCD Panels, X-Bit labs takes a look at 7 different LCD monitors, discussing(in detail) response time compensation. This isn't a light read folks, so grab some coffee, and emerge yourself in 20 pages of LCD technology."The ISO... Read more...
First ... Prev 3 4 5 6 7