@9to5mac.com 3 months ago
NSA buys personal data illegally-obtained from smartphone users, reveals senator
@9to5mac.com 9 months ago
Russian security service bans all Apple devices, repeats nonsensical spying claims
@zdnet.com 1 year ago
NSA and CISA alert: This phishing scam could give hackers control of your PC
@theregister.com 1 year ago
NSA urges orgs to use memory-safe programming languages
@zdnet.com 1 year ago
NSA, FBI warning: Beware these 20 software flaws most used by hackers
@Paula_Piccard 2 years ago
NSA, CISA Say Industry Should Use Attestation Technology to Secure 5G Environments - #DataSecurity #Privacy #100DaysOfCode #Security #Cloud #MachineLearning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection #Malware #Hacked #infosec https://bit.ly/3nHd1AM https://t.co/pVrMT3X0a0
@wired.com 2 years ago
Even the CIA and NSA Use Ad Blockers to Stay Safe Online
@neowin.net 2 years ago
FBI, NSA, and CIA use ad blockers due to fear of targeted ads
@zdnet.com 2 years ago
HPE wins $2B contract with the NSA
@clark_robotics 4 years ago
Court finds FBI use of NSA database violated Americans' Fourth Amendment rights - CNET: #BigData #MachineLearning #AI #IoT HT: @motorcycletwitt @mikequindazzi https://www.cnet.com/news/court-finds-fbi-use-of-nsa-database-violated-americans-fourth-amendment-rights/#ftag=CAD590a51e https://t.co/YGZDdm3KOb
@techdirt.com 4 years ago
FISA Court Finds The FBI Is Still Violating The Fourth Amendment With Its Abuse Of NSA Collections
@cnet.com 4 years ago
Court finds FBI use of NSA database violated Americans' Fourth Amendment rights - CNET
@cointelegraph.com 4 years ago
Edward Snowden Used Bitcoin to Pay for Servers Used in NSA Leak
@ccn.com 5 years ago
Cryptojacking is up 459% in 2018, and it’s the NSA’s Fault
@mashable.com 6 years ago
The U.S. Government Accuses Two Chinese Phone Makers of Spying on Americans - Here's Why We Think It's Bullsh*t
@theverge.com 6 years ago
Don’t use Huawei phones, say heads of FBI, CIA, and NSA
@techcrunch.com 7 years ago
The NSA eavesdrops on in-flight mobile use too
@techcrunch.com 7 years ago
Signups for encrypted mail client ProtonMail double after election
@thenextweb.com 7 years ago
Snowden on Google Allo: ‘Don’t use it’
@extremetech.com 8 years ago
Microsoft sues US government, asks court to declare secrecy orders unconstitutional
@superglaze 8 years ago
RT @ExtremeTech: The NSA wanted Hillary Clinton to use this crazy secured Windows CE phone http://www.extremetech.com/mobile/225058-the-nsa-wanted-hillary-clinton-to-use-this-crazy-secured-windows-ce-phone https://t.co/1CS3Fb75xb
@extremetech.com 8 years ago
The NSA wanted Hillary Clinton to use this crazy secured Windows CE phone
@venturebeat.com 8 years ago
The tech industry, according to Trump
@extremetech.com 8 years ago
New NSA rules allow agency to share data without privacy protections or terrorism links
@mathewi 8 years ago
RT @FromCarl: Apple vs. FBI brings more Q's, including can gov't use yr fingerprint to unlock devices? @webbmedia for @CNNOpinion http://cnn.it/1RqKcAx
@superglaze 8 years ago
RT @ncardozo: Remember when FBI & NYPD were urging us to use full disk encryption to protect our security? https://www.techdirt.com/articles/20160221/21583733665/remember-when-fbi-nypd-told-people-to-upgrade-their-iphones-to-enable-stronger-security.shtml https://t.co/GFi6ihItOz
@VGCanada 8 years ago
Reflecting on the importance of #BigData Governance & ethical use of #Analytics. @SchulichSchool @Tim_Cook #Apple https://t.co/AZ25ZwSBZc
@superglaze 8 years ago
RT @TheRegister: Real talk: The NSA loves it when you use PGP, sorry. http://reg.cx/2jDB
@thenextweb.com 8 years ago
GCHQ open-sources its spy software
@extremetech.com 8 years ago
France reportedly considers blocking Tor, public Wi-Fi in wake of Paris attacks
@techcrunch.com 8 years ago
U.K. Spy Agency Does Not Require Individual Warrants To Hack
@extremetech.com 8 years ago
UK introduces law to ban civilian encryption, but government policies recommend its use
@venturebeat.com 8 years ago
NSA director just admitted that government copies of encryption keys are a security risk
@techcrunch.com 8 years ago
What The U.K. Surveillance Powers Review Says On Encryption And Hacking
@thenextweb.com 8 years ago
The UK government wants more powers to spy on how you use the internet
NSA planned to use the Play Store to implant spyware on target smartphones
@WIRED 8 years ago
If you value privacy and have worries about an expanding drone surveillance program, drones being shared by agencies and the lack of transparency are concerning, ...
@thenextweb.com 8 years ago
Mass data-collection is back on the cards in the UK
@theverge.com 8 years ago
Step two of redacted surveillance guide raises questions about step one
@thenextweb.com 9 years ago
Wikimedia Foundation sues NSA to challenge mass surveillance
@techcrunch.com 9 years ago
The Doomed Quest For The Golden Key
@gigaom.com 9 years ago
As FTC adds encryption to its website, government remains unsure on corporate use
@WIRED 9 years ago
A newly published document leaked by Edward Snowden indicates that the NSA feared that Iran may be studying US cyberattacks. Iran, the document states, “has demonstrated...
@WIRED 9 years ago
The Investigatory Powers Tribunal ruled today that the UK’s use of NSA data was illegal because it violated the European Convention on Human Rights.
@thenextweb.com 9 years ago
The NSA has reportedly been spying on North Korean networks since 2010
@thenextweb.com 9 years ago
David Cameron’s plan to ban end-to-end encryption is catastrophic for Internet freedom
@WIRED 9 years ago
We explored the question of why we still use black boxes and what alternatives there are in this piece from 2011, which remains relevant in light of AirAsia Flight...
@theverge.com 9 years ago
The NSA listened in on trade group talks to stay ahead of phone encryption