Please read and agree to the
terms and conditions
of this site.
I agree
Government Cyber Security and Surveillance
/tech
Clear filters and search
Format
photo
text
Tags
security
60
×
nsa
tc
privacy
business
fbi
surveillance
encryption
government
mass surveillance
apple
national security agency
europe
internet
malware
mobile
national security
snowden
edward snowden
gadgets
gchq
ransomware
russia
california
cryptography
cyberwarfare
donald trump
espionage
facebook
fisa
investigatory powers bill
iphone
law enforcement
prism
top-stories
apps
big data
companies listed on nasdaq
computer security
computer security organizations
What
new
60
×
nsa
security
read
u.s
data
fbi
intelligence
agency
government
phone
surveillance
apple
hacking
iphone
national
report
snowden
today
york
agencies
edward
encryption
leaked
malware
privacy
san
service
spy
tech
bernardino
hackers
law
published
using
week
allow
americans
built
compel
Language
unset
Current search:
new
×
security
×
@wired.com
8 months ago
The Pentagon Tried to Hide That It Bought Americans' Data Without a Warrant
@wired.com
1 year ago
Kaspersky Says New Zero-Day Malware Hit iPhones—Including Its Own
@venturebeat.com
1 year ago
CISA pressures tech vendors to ship secure software ‘out of the box’
@geekwire.com
4 years ago
NSA opts to ‘Turn a New Leaf,’ disclosing Windows vulnerability rather than using it as a weapon
@techcrunch.com
5 years ago
In a rare advisory, NSA urges users to patch BlueKeep flaw
@bgr.com
5 years ago
NYT: Chinese hackers detected and repurposed NSA malware for attacks
@coindesk.com
5 years ago
New Crypto-Mining Malware Targeting Asian Firms With NSA Tools
@cointelegraph.com
5 years ago
New Crypto Mining Malware Beapy Uses Leaked NSA Hacking Tools: Symantec Research
@techcrunch.com
5 years ago
A new cryptocurrency mining malware uses leaked NSA exploits to spread across enterprise networks
@venturebeat.com
6 years ago
Convicted of leaking secret Russian hacking docs, Reality Winner gets unlikely new champion: President Trump
@engadget.com
6 years ago
Uber hires former NSA counsel as new security head
@engadget.com
6 years ago
NSA leader creates task force to fight Russian cyberattacks
@techcrunch.com
6 years ago
Dreamit Ventures launches new security vertical
@techcrunch.com
6 years ago
Virtru’s new API brings encryption tech built by ex-NSA engineer to third-party developers
@techcrunch.com
6 years ago
Edward Snowden’s new app turns any Android phone into a surveillance system
@extremetech.com
7 years ago
Kaspersky Lab is Awfully Tight With Russian Intelligence
@extremetech.com
7 years ago
New Ransomware Attack Used Leaked NSA Exploits to Hit NHS
@techcrunch.com
7 years ago
NSA ends controversial collection of Americans’ emails that mention foreign targets
@techcrunch.com
7 years ago
The Shadow Brokers are back with exploits for Windows and global banking systems
@techcrunch.com
7 years ago
Intel report on hacking says Russian interference with US election was ‘boldest yet’
@techcrunch.com
7 years ago
The NSA eavesdrops on in-flight mobile use too
@theverge.com
7 years ago
James Clapper, who led America’s digital mass surveillance efforts, has resigned
@venturebeat.com
7 years ago
Encrypted email service ProtonMail says new signups doubled after Trump win
@de.engadget.com
7 years ago
Bericht: Yahoo nutzte einen Virenscanner, um E-Mails zu überwachen
@extremetech.com
7 years ago
From civil liberties champion to turncoat: Yahoo built specialized software to spy on users for the NSA
@techcrunch.com
8 years ago
MIT’s anonymous online communications protocol Riffle could beat Tor at its own game
@techcrunch.com
8 years ago
New Snowden document reveals UK spy agency warned of ‘too much data’ risk in 2010
@venturebeat.com
8 years ago
Search of old computer files allowed by U.S. appeals court
@mashable.com
8 years ago
How researchers identified a heart condition using telephone metadata and search engines alone
@venturebeat.com
8 years ago
FBI raises alarm over ransomware targeting U.S. businesses
@techcrunch.com
8 years ago
Conflict between Apple and the FBI started 18 months ago with the release of iOS 8, says Bloomberg
@extremetech.com
8 years ago
It’s not just Apple: Sources claim government goes after source code on a regular basis
@thenextweb.com
8 years ago
NYT: Apple engineers may quit before being forced to code insecure version of iOS for the FBI
@techcrunch.com
8 years ago
Draft UK surveillance powers bill takes more flak at second reading
@extremetech.com
8 years ago
New NSA rules allow agency to share data without privacy protections or terrorism links
@venturebeat.com
8 years ago
Federal judge pokes holes in government’s case against Apple
@techcrunch.com
8 years ago
Innovations In Cybersecurity At RSA 2016
@venturebeat.com
8 years ago
The FBI’s Apple hack would be a big, shiny gift to criminals
@techcrunch.com
8 years ago
Mark Cuban Commends Apple, Proposes New Law For Tech Security
@mashable.com
8 years ago
Donald Trump slams Apple over San Bernardino iPhone: 'Who do they think they are?'
@techcrunch.com
8 years ago
The Repeat Political Madness Of Never-Ending Crypto Wars
@techcrunch.com
8 years ago
U.K. Users’ Online Activity To Be Logged Under New Surveillance Law
@extremetech.com
9 years ago
iOS 9 exploit allows access to photos and contacts without unlocking iPhone
@techcrunch.com
9 years ago
Extent Of U.K.’s Surveillance Dragnet Probed In Fresh Legal Challenge
@venturebeat.com
9 years ago
Hands-on with Facebook’s new PGP encryption features
@techcrunch.com
9 years ago
Push For Greater State Surveillance Powers Could Have Chilling Effect On U.K. Tech Sector
@venturebeat.com
9 years ago
Spy cell towers: A new service is hunting for you
@venturebeat.com
9 years ago
Silent Circle buys out ‘Blackphone’ and will debut new models next week in Spain
First
Prev
Page 1
(current)
Next
Last