@extremetech.com 1 year ago
The NSA Is Displaying Its Old Nuke Launching System in a Museum
@extremetech.com 4 years ago
NSA Reports Major Windows 10 Flaw to Microsoft, Patch Coming Today
@extremetech.com 4 years ago
Russia May Require PC, Phone Vendors to Preload Apps
@extremetech.com 4 years ago
Security Researcher Adds Spy Chip to IT Equipment for Just $200
@extremetech.com 4 years ago
People Aren’t Patching for the BlueKeep Windows Exploit, and Even the NSA Is Worried
@extremetech.com 5 years ago
Australia Becomes First Western Nation to Ban Secure Encryption
@extremetech.com 5 years ago
Apple Denies Bloomberg Chinese Hacking Story to Congress
@extremetech.com 5 years ago
Amazon, Apple Servers Completely Compromised by Chinese Hardware Backdoors
@extremetech.com 6 years ago
Intelligence Officials Warn Against Buying Huawei and ZTE Phones, Without Justification
@extremetech.com 6 years ago
Intel Disclosed Spectre, Meltdown to Chinese Companies Before US Government
@extremetech.com 6 years ago
Dutch Intelligence Tipped off FBI, NSA on Russian Cyber Attacks
@extremetech.com 6 years ago
NSA, Army Breach Exposed 100GB of Highly Classified Data
@extremetech.com 6 years ago
Israel Caught Russian Hackers Using Kaspersky Software to Spy on the US
@extremetech.com 6 years ago
HP Enterprise Shared Pentagon’s Cyberdefense Source Code With Russia
@extremetech.com 6 years ago
Roomba Maker Wants to Sell Maps of Your Home to Google, Amazon
@extremetech.com 6 years ago
20 Best Tips to Stay Anonymous and Protect Your Online Privacy
@extremetech.com 6 years ago
Kaspersky Lab is Awfully Tight With Russian Intelligence
@extremetech.com 6 years ago
NSA-Derived Ransomware Is So Serious, Microsoft Is Patching Windows XP
@extremetech.com 6 years ago
New Ransomware Attack Used Leaked NSA Exploits to Hit NHS
@extremetech.com 7 years ago
Bose accused of spying on end users, data mining their private records via headphone app
@extremetech.com 7 years ago
Jeff Sessions, Trump’s pick for attorney general, will likely renew fight against strong encryption
@extremetech.com 7 years ago
The government’s public evidence falls short of proving Russian involvement in the DNC hack
@extremetech.com 7 years ago
It’s time to pardon Edward Snowden, and defuse Putin’s increasingly dangerous weapon
@extremetech.com 7 years ago
In bid to achieve quantum encryption, China set to finish 2,000-kilometer ‘quantum link’
@extremetech.com 7 years ago
Feds demand fingerprints from all home residents to unlock their phones
@extremetech.com 7 years ago
From civil liberties champion to turncoat: Yahoo built specialized software to spy on users for the NSA
@extremetech.com 7 years ago
Leaked manuals confirm Stingrays can be used for mass surveillance, bypassing smartphone security
@extremetech.com 7 years ago
Your guide to the ‘Shadow Brokers’ NSA theft, which puts the Snowden leaks to shame
@extremetech.com 7 years ago
19 ways to stay anonymous and protect your online privacy
@extremetech.com 7 years ago
Snowden and colleague design ‘introspection engine’ anti-snooping mod for the iPhone 6
@extremetech.com 7 years ago
Warrantless spying on Americans more than doubled since 2013: oversight report
@extremetech.com 8 years ago
Microsoft sues US government, asks court to declare secrecy orders unconstitutional
@extremetech.com 8 years ago
FBI’s iPhone hack limited to the iPhone 5c, earlier devices
@extremetech.com 8 years ago
Apple may design its own servers to avoid government snooping
@extremetech.com 8 years ago
There can be no middle ground on encryption
@extremetech.com 8 years ago
The cybersecurity threat – are we protected yet?
@extremetech.com 8 years ago
The NSA wanted Hillary Clinton to use this crazy secured Windows CE phone
@extremetech.com 8 years ago
Apple engineers might quit company before agreeing to unlock the iPhone
@extremetech.com 8 years ago
It’s not just Apple: Sources claim government goes after source code on a regular basis
@extremetech.com 8 years ago
A new plan to fight ISIS: turning big data on social media
@extremetech.com 8 years ago
The gloves are off: FBI argues it can force Apple to turn over iPhone source code
@extremetech.com 8 years ago
New NSA rules allow agency to share data without privacy protections or terrorism links
@extremetech.com 8 years ago
Chertoff says forcing Apple to unlock iPhone equivalent to building a biological weapon
@extremetech.com 8 years ago
Court filing confirms Carnegie Mellon University hacked Tor to unmask users
@extremetech.com 8 years ago
It’s all about precedent: Justice Department wants Apple to unlock 12 additional devices
@extremetech.com 8 years ago
DOJ filing: Apple’s refusal to decrypt iPhone is just a ‘marketing strategy’
@extremetech.com 8 years ago
Apple Sauce: The DOJ wants to force Apple to cooperate; Trump calls for Apple boycott
@extremetech.com 8 years ago
Google, Microsoft back Apple on encryption; Trump blasts Apple