Please read and agree to the
terms and conditions
of this site.
I agree
Government Cyber Security and Surveillance
/tech
Clear filters and search
Format
photo
text
Tags
nsa
security
1
malware
surveillance
china
cybersecurity
section 702
upstream collection
about collection
aclu
analytics
artificialintelligence
backdoor searches
blockchain
citrix
cloud
cloudsecurity
computer security
cyberattack
cybercrime
cyberrisk
cyberwarfare
databreach
dataprotection
department of energy
dragos
ed snowden
electricity
energy
exploits
fbi
federal bureau of investigation
hackers
ics
infosec
ivanti
january 6th
lobbying
location data brokers
What
nsa
23
×
used
23
×
fbi
hackers
security
agency
state
china
day
warning
access
backed
critical
data
devices
flaws
government
malware
national
spy
surveillance
tool
u.s
vulnerability
widely
windows
years
zero
agencies
allows
americans
attack
backdoor
brokers
cisa
claims
collect
collected
court
developed
Language
unset
23
×
Current search:
used
×
nsa
×
unset
×
@techcrunch.com
2 months ago
NSA says it’s tracking Ivanti cyberattacks as hackers hit US defense sector
@techdirt.com
6 months ago
Former DHS/NSA Official Stewart Baker Decides He Can Help NSO Group Turn A Profit
@neowin.net
11 months ago
Russia claims NSA used Apple backdoor vulnerabilities to spy on iPhone users
@techdirt.com
11 months ago
FBI Used Section 702 Surveillance Powers To Spy On Protesters, Crime Victims, And Political Party Donors
@techdirt.com
1 year ago
Supreme Court Denies Cert To NSA Case, Allows State Secret Privilege To Roll On Unaltered
@techcrunch.com
1 year ago
NSA says Chinese hackers are exploiting a zero-day bug in popular networking gear
@techdirt.com
1 year ago
Microsoft Says China Is Abusing Vulnerability Disclosure Requirements To Hoard Exploits
@zdnet.com
1 year ago
NSA, FBI warning: Beware these 20 software flaws most used by hackers
@eff.org
1 year ago
What is Fog Data Science? Why is the Surveillance Company so Dangerous?
@zdnet.com
1 year ago
NSA, FBI warning: Hackers are using these flaws to target VPNs and network devices
@techcrunch.com
2 years ago
US warns of state-backed malware designed to hijack critical infrastructure systems
@theregister.com
2 years ago
Anatomy of top-tier suspected NSA backdoor code
@zdnet.com
2 years ago
DOJ fines NSA hackers who assisted UAE in attacks on dissidents
@theregister.com
3 years ago
The perils of non-disclosure? China 'cloned and used' NSA zero-day exploit for years before it was made public
@wired.com
3 years ago
China Hijacked an NSA Hacking Tool—and Used It for Years
@techdirt.com
3 years ago
Patriot Act Used By The FBI To Collect Internet Browsing Data, Contradicting Claims Made To Oversight
@theregister.com
3 years ago
NSA: We've learned our lesson after foreign spies used one of our crypto backdoors – but we can't say how exactly
@zdnet.com
3 years ago
FBI and NSA expose new Linux malware Drovorub, used by Russian state hackers
@techdirt.com
4 years ago
This Week In Techdirt History: January 19th - 25th
@reach2ratan
4 years ago
Critical Windows Vuln Used To Rickroll The NSA And Github https://buff.ly/2Tz8wcD #CyberSecurity #Databreach #Cyberrisk #infosec @reach2ratan #AI #ML #malware #cloud #cloudsecurity #Machinelearning #Analytics #Blockchain #dataprotection #Privacy #ArtificialIntelligence https://t.co/aCERtwhSf7
@wired.com
4 years ago
A Windows 10 Vulnerability Was Used to Rickroll the NSA and Github
@theregister.co.uk
4 years ago
NSA to Congress: Our spy programs don’t work, aren’t used, or have gone wrong – now can you permanently reauthorize them?
@cnet.com
4 years ago
Court finds FBI use of NSA database violated Americans' Fourth Amendment rights - CNET