- Welcome Guest
- Sign In
The U.S. National Security Agency secretly shares the communications data it has amassed over the years with nearly 24 government agencies using a search engine resembling Google Search, according to documents released by Edward Snowden. That's more than 850 billion records of phone calls, emails, c...
The U.S. Transportation Security Administration, part of the Department of Homeland Security, has spent more than a billion dollars on full-body scanners designed to strengthen airport security. It turns out that at least one model of scanner in use for four years -- the Rapiscan Secure 1000 full-bo...
In a move influenced by Edward Snowden's revelations about the NSA's email snooping, Yahoo and Google last week announced that they were cooperating on end-to-end encrypting their webmail products. "We will release source code this fall so that the open source community can help us refine the experi...
The NSA is working on a new program codenamed "MonsterMind" that will automate the monitoring of traffic patterns on the Internet to look for attacks, whistleblower Edward Snowden revealed. When it detects an attack, MonsterMind will automatically block it from entering the U.S. cyberinfrastructure....
News that a Russian gang has stockpiled more than a billion purloined user name and password combinations has revved up the Internet's reputation as a post industrial Wild, Wild West. Just how much havoc will be raised by the gang remains to be seen. The data thieves so far appear content to use the...
The Wikimedia Foundation on Wednesday released its first-ever transparency report -- and along with it a protest against Europe's "right to be forgotten" law. Wikimedia is the nonprofit owner of Wikipedia and other sites. "Last week, the Wikimedia Foundation began receiving notices that certain link...
A routine scan of a Texas man's Gmail by Google has led to his arrest on child pornography possession and promotion charges. John Henry Skillern, 41, of Houston was arrested by police July 30 following a tip by Google. He has been charged with one count each of child pornography possession and child...
News that two Carnegie-Mellon CERT researchers have developed an inexpensive way to breach the Tor network has the project, privacy advocates, and probably criminals who use the network equally concerned. The Tor Project posted has advised relays to upgrade to Tor 0.2.r.23e or 0.2.5.6-alpha to close...
Russia wants Apple and SAP to turn over their source code in yet another instance of fallout resulting from leaks about NSA surveillance activities. The suggestion reportedly came last week, when Communications Minister Nikolai Nikiforov met with executives of the two companies: Peter Nielsen, Apple...
Government snooping on Americans would be curtailed under a bill introduced Tuesday in the U.S. Senate. The measure, sponsored by Senate Judiciary Chairman Patrick Leahy, D-Vt., would ban bulk collection of domestic information, limit the scope of searches by government agencies, and add transparenc...
OkCupid has admitted carrying out psychological experiments on its users. Because OkCupid doesn't really know what it's doing, it needs to experiment to see what works and what doesn't, cofounder Christian Rudder wrote in a blog post. Every Internet company needs to test different things with users,...
Google is seeking 175 volunteers from whom it will collect bodily samples in an effort to create their biochemical fingerprints and establish the baseline for a healthy body. The Baseline study, to be run by Google X labs, will seek to connect traditional clinical observations of health, such as die...
The Tor Project is working to remedy a vulnerability in its anonymity software following the sudden cancellation of a talk at next month's Black Hat security conference in Las Vegas that would have revealed it. The planned talk, entitled "You Don't Have to be the NSA to Break Tor: Deanonymizing User...
The long-held belief that Android is the least secure of mobile OSes was shattered by security researcher and expert iOS hacker Jonathan Zdziarski over the weekend. He unveiled a host of iOS vulnerabilities, the scope of which was staggering: undocumented services that bypass backup encryption and c...
Concerns about overly broad searches of digital data by law enforcement once again have emerged after a federal judge ruled that officials armed with a warrant can seize and hold a suspect's entire email account. Such an action would not violate the suspect's rights under the Fourth Amendment of the...