Guest Post Ever since Black Hat USA wrapped up last week, I’ve been thinking about the irony of attendees going into heightened security mode during the conference itself – like never connecting to open Wi-Fi or encrypting all information stored on your laptop – then likely slipping back into a more lax mode throughout the rest of the year.
The National Security Agency can search for U.S. citizens’ names and other information under the Foreign Intelligence Surveillance Act, according a document Edward Snowden leaked to The Guardian.
President Barack Obama laid out a four-step plan to help the American public understand the government’s surveillance programs, saying he, too, would be skeptical if he wasn’t on the inside.
Fewer admins mean fewer people that could possibly abuse classified data.
Apple CEO Tim Cook, Google exec Vint Cerf, AT&T CEO Randall Stephenson, and other technology leaders secretly met with President Barack Obama on Thursday to talk about the NSA and tech surveillance,
Guest Post For companies looking for newer, better sources of revenue, the government’s open data programs could be the answer.
The privacy-focused e-mail service that former-NSA contractor Edward Snowden reportedly used was shut down today after the founder left a note saying he’s gagged from talking about why it’s now offline.
The Obama administration says that the NSA isn’t reading your e-mail. But one newspaper reports that this may not be true.
Sponsored Post V-Key focuses on securing native applications and mobile websites by providing security layers, rather than the device itself, providing security without annoying the end customers.
President Obama has canceled a meeting with Russia’s Putin citing political issues including Edward Snowden’s asylum.
The government may soon help your business get insurance against hackers.
Sentinal Labs knows everything your computer is doing and can tell when that flow is being disrupted by something malicious.
Sponsored Post Smartphones are starting to attract malware, just as PCs have for years. What can you do about it?
Accessories like the Off Pocket are the best defense against the ever-present gaze of Big Brother.
FireEye, which uses virtual machines to monitor your network traffic, is headed to the public markets.
Here’s what it’s like to go to Def Con, the world biggest hacking conference.
The NSA has been secretly giving information from intelligence intercepts, wiretaps, informants, and phone records to the DEA to help them launch criminal investigations of Americans. Law enforcement agents are instructed to cover up the source of their information.
Apple says “most remaining services” in its hacked developer center will be relaunched this week.
Step 1: Don’t use the Internet. If Step 1 is a step too far, you can also try these handy suggestions.
Two House members provide documents on blocked attempts at oversight.
Even though they failed at passing major privacy legislation in their home state of Montana, two unlikely partners are trying to put out a bill that could be a model to the rest of the country.
Facebook’s bug bounty program is growing up and giving out lots of money.
Yes, if you can hack today’s human-controlled cars, imagine what you can do with the computers in a self-driving car.
A day after introducing the first true Google phone, Google has finally announced an app for recovering lost devices.
Lookout Mobile just found what may be the most sophisticated mobile malware businesses operating today.
The NSA spent much of yesterday talking about how limited its telephone call-tracking program is. But it failed to address new revelations about other tracking programs — like the ones that can tell what you’re Googling or Facebook chatting about.
National Security Agency leaker Edward Snowden has been granted temporary asylum in Russia and has finally left the airport where has been holed up for more than a month.
For the third time in a row, the U.S. government requested — and got — more user data from Twitter than all the other nations of the world combined. And that’s before you count Prism-style FISA requests from the NSA, which Twitter cannot legally disclose.
You’ve been told hundreds of times not to download apps from weird marketplaces. Here’s the scary proof of why.
NSA chief General Keith Alexander says the security community doesn’t know all the facts and needs to try and understand why the agency needs to conduct surveillance.
XKeyscore is a massive big data collection, warehousing, and analysis program that, if we can believe what Snowden is saying, basically lays bare your and my entire digital selves. Essentially, we’re Frodo and Sam, and the NSA is the Eye of Sauron — but better, smarter, more powerful.
Thanks to the magic of apps, tablets and smartphones are now cash registers, kiosks, demo stations, public calendars, and more. Thanks to the magic of management, that tablet or smartphone in your organization could be mine, yours, or some company’s.
The Massachusetts Institute of Technology (MIT) released a long-awaited report today investigating its actions in prosecuting programmer/activist Aaron Swartz for his role in hacking the school’s academic research paper database.
While Bradley Manning was found not guilty of Aiding the Enemy, he was found guilty of most other charges.
Editor’s Pick Just as email spam has cemented itself as an unstoppable scourge in our daily digital existence, content scraping bots are polluting the web by slowing sites down, stealing content, and generally running amok.
Yet another media company’s Twitter account has fallen victim to hackers. This time, the Syrian Electronic Army took over the Thomson Reuters account for about an hour.
In the latest version of iOS 7, released today, Apple included code for a Biometric Kit user interface which would enable scanning of a fingerprint on the one button Apple has included on all iPhones, the home button.
Two hackers discover a way to control your car’s brakes, steering, and much more.
Apple has restored a number of its dev center sites after taking them offline last week.