- Welcome Guest
- Sign In
In a keenly anticipated speech, President Obama on Friday announced reforms to the NSA's surveillance activities, but his pronouncements failed to please just about everyone. "We heard nothing in his speech or proposal that will repair the damage that has been done to the tech industry and the futur...
Syed Farhan Hussain, a 22-year-old from Luton, UK, was hit with additional jail time for refusing to divulge the password for a memory stick that police were eager to take a peek at. Police were unable to crack the password themselves and therefore sought Hussain's help; Hussain declined, prompting ...
Last week, China's military took its new "ultra-high speed missile vehicle" -- or "hypersonic glide vehicle," if you prefer -- for its first test drive, raising eyebrows among U.S. defense officials. The hypersonic aircraft, capable of maneuvering at a mindboggling 10 times the speed of sound -- tha...
Silent Circle and Geeksphone have teamed up to create the Blackphone -- a smartphone designed to truly protect users' privacy. Carrier- and vendor-independent, the Blackphone allows users to make and receive phone calls securely, as well as transfer and store files, swap secure text messages, and co...
The United States National Security Agency's surveillance efforts reportedly include radio transmissions from circuit boards and USB cards inserted surreptitiously into computers. This apparently has been going on since 2008. "This is pretty cool," said Jim McGregor, principal analyst at Tirias Rese...
Advanced persistent threats and stealth malware attacks have been making the rounds for years. Now, University of Michigan researchers Robert Axelrod and Rumen Iliev have created a mathematical model that, in essence, lays out the best time for nation-states to launch cyberattacks. Axelrod is a prof...
Huawei, the Chinese telecommunications outfit best known for its mobile phones and its propensity to spook U.S. lawmakers, announced that it has created China's first videogame console. The timing of Huawei's announcement, coming at this week's CES extravaganza in Las Vegas, is interesting: Just thi...
If you're inclined to make resolutions this time of year and you're concerned about your online and offline security, here are some suggestions that can keep you safer in the days ahead. At the top of the list: You should vow to change the passwords to your important accounts on a frequent basis. "T...
It is time to look back on 2013 and consider what we've learned about technology and human nature. Both Apple and Dell were massively changed, and Google went from a company that wanted our private information to one that wanted our jobs. The U.S. government decided, through the NSA, that laws don't...
For the third time in three years, computers at The Washington Post came under attack by hackers, but this time it seems the paper was ready for them. The intrusion targeting the usernames and passwords of Post employees was relatively short in duration -- a few days, at most. No subscriber informat...
A task force set up by President Obama to review the National Security Agency's surveillance activities has suggested a list of what it calls "significant" reforms, including restrictions on spying. Among the recommendations: changes in surveillance of both U.S. and non-U.S. citizens to protect thei...
A federal judge has ruled that the NSA's collection of telephone metadata is likely a violation of the Fourth Amendment to the U.S. Constitution, adding another point of debate to this volatile issue. U.S. District Judge Richard Leon's ruling has extra impact because he is a conservative appointed b...
NSA official Rick Ledgett, who has been with the agency for 25 years, suggested offering whistleblower Edward Snowden amnesty, but agency head Gen. Keith Alexander squashed the idea. About 31,000 of the possibly 1.7 million documents Snowden stole from the agency contain information that could be he...
The era of Big Data has scary implications for both personal privacy and national security and puts our society at significant risk. The impact of a cyberattack on a large financial institution or a security breach at a government's secure data house, for example, would have dire consequences. As a ...
The Australian state of Victoria has made it illegal to distribute explicit images without consent. The new law specifically outlaws "non-consensual sexting," which generally takes place when lovers split and there is post-breakup payback in the form of intimate photos of the former partners. The la...