Thursday, September 21, 2017

SECURITY

SECURITY

A disclosure that the government was collecting phone data from customers of Verizon has already generated controversy -- by John Ribeiro, courtesy CIO -- IDG News Service (Bangalore Bureau) — The Foreign Intelligence Surveillance Court has renewed...

Heads up! Small groups of cyber-mercenaries are now conducting targeted hit-and-run attacks for anyone willing to pay the price. It’s always a pleasure to go to the Kaspersky Labs annual Analyst Summit, as I did...
Police

With three billion camera-equipped cellphones in circulation, we are awash in visual information. Cameras are lighter, smaller and cheaper than ever and they’re everywhere, making it possible for nearly anyone to watch, create, share...
University of Washington

Sending a password or secret code over airborne radio waves like WiFi or Bluetooth means anyone can eavesdrop, making those transmissions vulnerable to hackers who can attempt to break the encrypted code. Now, University of...

Senate Breaking News: Play With An MIT Tool That Visualizes How The NSA Can Map Your Relationships The brainiacs at MIT created a cool visualization program to map how the National Security Agency can understand your...

by Zack Colman, courtesy TheHill-   Personal information for roughly 14,000 past and current Energy Department employees was compromised in a recent hacking attack, the department said in a memo to staff. Personally identifiable information,...

by Raphael Satter, courtesy Associated Press A Texas-based email service reportedly used by National Security Agency systems analyst Edward Snowden said it was shutting down Thursday, explaining in a cryptic message that it would rather go...

Yet another thing you always wanted to know about the workings of the U.S. government ... but didn't know to ask. by Megan Garber (courtesy TheAtlantic) If "Things We're Learning About the Security Workings of the...
Cybersecurity just got even more difficult. Charis Tsevis/flickr, CC BY-NC-ND

It is looking increasingly likely that computer hackers have in fact successfully attacked what had been the pinnacle of cybersecurity – the U.S. National Security Agency (NSA). A few days ago, reports began emerging...

Secret slides reveal massive government spying, tech companies dispute reports. by Cyrus Farivar (courtesy ArsTechnica) It’s worse than we thought. Just one day after disclosing the existence of a secret court order between the National...

Max Rivlin (courtesy Gawker) Edward Snowden, a former CIA technical assistant and current employee of the defense contractor Booz Allen Hamilton, which assigned him to work for the NSA, has revealed himself as the leaker behind...

by Max Rivlin-Nadler (courtesy Gawker) Glenn Greenwald and the Guardian have another leak: Meet "Boundless Informant" the NSA tool that records and analyzes where NSA intelligence comes from, including over 3 billion pieces of intelligence from...