@coindesk.com 11 months ago
Edward Snowden: Researchers Should Train AI to Be ‘Better Than Us’
@engadget.com 2 years ago
US warns of state-supported malware built to attack critical infrastructure
@techcrunch.com 4 years ago
A new cryptocurrency mining malware uses leaked NSA exploits to spread across enterprise networks
@techcrunch.com 5 years ago
Hackers are using leaked NSA hacking tools to quietly hijack thousands of computers
@techcrunch.com 5 years ago
Synack is the latest cybersecurity company to offer state elections its services for free
@ZDNet 6 years ago
Bad Rabbit ransomware spread using leaked NSA EternalRomance exploit, researchers confirm http://zd.net/2gU8Q4S https://t.co/A69FLRxsbB
@ZDNet 6 years ago
Bad Rabbit ransomware spread using leaked NSA EternalRomance exploit, researchers confirm http://zd.net/2gRXC0N https://t.co/7EQBrinber
@ZDNet 6 years ago
Bad Rabbit ransomware spread using leaked NSA EternalRomance exploit, researchers confirm http://zd.net/2gUQzEx https://t.co/Zw4k2Vz5oe
@ZDNet 6 years ago
Bad Rabbit ransomware spread using leaked NSA EternalRomance exploit, researchers confirm http://zd.net/2gQaJzN https://t.co/lQc77LE61t
@ZDNet 6 years ago
Bad Rabbit ransomware spread using leaked NSA EternalRomance exploit, researchers confirm http://zd.net/2gNzwUQ @dannyjpalmer https://t.co/LTw6bN2ARq
@mashable.com 6 years ago
There's now a crowdfunding campaign to buy stolen hacking tools
@theverge.com 6 years ago
The NSA’s leaked Windows hack caused more damage than just WannaCry
@venturebeat.com 6 years ago
Stolen U.S. spy agency tool used to launch global cyberattack
@WIRED 7 years ago
Despite the group’s unverified, over-the-top claims and comically broken English, researchers who downloaded the sample posted by the group say it does ...
@mashable.com 7 years ago
How researchers identified a heart condition using telephone metadata and search engines alone
@WIRED 8 years ago
We now know that the FBI was able to bypass the anonymity software Tor with information they obtained from a subpoena to Tor-focused security researchers ...
@thenextweb.com 8 years ago
FBI reportedly forced researchers to hand over data that exposed TOR users
@theverge.com 8 years ago
More than half of Americans think Apple should comply with FBI, finds Pew survey
@WIRED 8 years ago
Researchers solve Juniper backdoor mystery; signs point to NSA http://wired.trib.al/D4ofHcV
@thenextweb.com 8 years ago
Hacked surveillance company struggles to regain control
@WIRED 9 years ago
According to researchers, millions of machines contain basic BIOS vulnerabilities that let anyone with moderately sophisticated hacking skills compromise and control...
@theverge.com 9 years ago
These are the silly URLs the NSA uses for cyber espionage
@techcrunch.com 9 years ago
Apple Products May Have Been Compromised By CIA Mass Surveillance Program
@theverge.com 9 years ago
Apple targeted by CIA spies for years, say new Snowden documents
@thenextweb.com 9 years ago
Kaspersky Lab reveals spyware on the world’s most popular hard drives, suspects the NSA
@theverge.com 9 years ago
Someone (probably the NSA) has been hiding viruses in hard drive firmware
@WIRED 9 years ago
Researchers say the newly uncovered worm may have served as a kind of test run for Stuxnet, allowing the attackers to map a way to targeted machines in Iran that...
@venturebeat.com 9 years ago
Al Qaeda gets serious about mobile and encryption — reportedly thanks to Snowden
@techcrunch.com 9 years ago
Security Researchers Uncover The Tools Governments Use To Spy On Our Phones