@wired.com 5 months ago
Senate Leaders Plan to Prolong NSA Surveillance Using a Must-Pass Bill
@neowin.net 10 months ago
Russia claims NSA used Apple backdoor vulnerabilities to spy on iPhone users
@zdnet.com 1 year ago
Dashlane: Pricing, features, and how to get started
@theregister.com 1 year ago
Months after NSA disclosed Microsoft cert bug, datacenters remain unpatched
@zdnet.com 1 year ago
NSA, FBI warning: Hackers are using these flaws to target VPNs and network devices
@coindesk.com 1 year ago
Edward Snowden Played Key Role in Zcash Privacy Coin’s Creation
@zdnet.com 2 years ago
Security warning: Hackers are using this new malware to target firewall appliances
@zdnet.com 2 years ago
Building cyber radar systems could alert Indo-Pacific nations and their allies
@zdnet.com 2 years ago
NSA, FBI warn of ongoing brute force hacking campaign tied to Russian military
@zdnet.com 3 years ago
NSA warns against using DoH inside enterprise networks
@engadget.com 3 years ago
Microsoft confirms it found compromised SolarWinds code in its systems
@theregister.com 3 years ago
Can we stop megacorps from using and abusing our data? That ship has sailed, ex-NSA lawyer argues in new book
@techdirt.com 3 years ago
This Week In Techdirt History: August 30th - September 5th
@geekwire.com 4 years ago
NSA opts to ‘Turn a New Leaf,’ disclosing Windows vulnerability rather than using it as a weapon
@techdirt.com 4 years ago
The City Of Baltimore Blew Off A $76,000 Ransomware Demand Only To Find Out A Bunch Of Its Data Had Never Been Backed Up
@neowin.net 4 years ago
Cyber criminals are using a stolen NSA tool to carry out digital attacks in Baltimore
@engadget.com 4 years ago
Ransomware attacks in US cities are using a stolen NSA tool
@zdnet.com 4 years ago
Chinese hackers were using NSA malware a year before Shadow Brokers leak
@coindesk.com 5 years ago
New Crypto-Mining Malware Targeting Asian Firms With NSA Tools
@techcrunch.com 5 years ago
A new cryptocurrency mining malware uses leaked NSA exploits to spread across enterprise networks
@eff.org 5 years ago
Congress Has a Chance to Finally End the NSA’s Mass Telephone Records Program
@IainLJBrown 5 years ago
When Math and Science Collide, Using Artificial Intelligence at the NSA - Society of Women Engineers Read more here: https://ift.tt/2Faw28c #ArtificialIntelligence #AI #DataScience #MachineLearning #BigData #DeepLearning #NLP #Robots #IoT
@IainLJBrown 5 years ago
When Math and Science Collide, Using Artificial Intelligence at the NSA - Society of Women Engineers Read more here: https://ift.tt/2Faw28c #ArtificialIntelligence #AI #DataScience #MachineLearning #BigData #DeepLearning #NLP #Robots #IoT
@techcrunch.com 5 years ago
Hackers are using leaked NSA hacking tools to quietly hijack thousands of computers
@techcrunch.com 5 years ago
CIA, NSA and the Pentagon still aren’t using a basic email security feature
@techcrunch.com 5 years ago
Cryptocurrency mining attacks using leaked NSA hacking tools are still highly active a year later
@mashable.com 6 years ago
Chinese messaging app WeChat banned by Australia's Defence Force
@techcrunch.com 6 years ago
Warrantless surveillance law proves it’s time to take privacy into our own hands
@mashable.com 6 years ago
The U.S. Government Accuses Two Chinese Phone Makers of Spying on Americans - Here's Why We Think It's Bullsh*t
@mashable.com 6 years ago
CIA, FBI, NSA: We don't recommend Huawei or ZTE phones
FBI, CIA, and NSA chiefs advise against using Huawei and ZTE phones
@techcrunch.com 6 years ago
AWS beefs up threat detection with Sqrrl acquisition
@techcrunch.com 6 years ago
Edward Snowden’s new app turns any Android phone into a surveillance system
@WIRED 6 years ago
Opinion: "Thanks to companies like these, an autocrat whose country has poor national infrastructure but whose regime has billions of dollars can order ...
@ZDNet 6 years ago
Bad Rabbit ransomware spread using leaked NSA EternalRomance exploit, researchers confirm http://zd.net/2gU8Q4S https://t.co/A69FLRxsbB
@ZDNet 6 years ago
Bad Rabbit ransomware spread using leaked NSA EternalRomance exploit, researchers confirm http://zd.net/2gRXC0N https://t.co/7EQBrinber
@ZDNet 6 years ago
Bad Rabbit ransomware spread using leaked NSA EternalRomance exploit, researchers confirm http://zd.net/2gUQzEx https://t.co/Zw4k2Vz5oe
@ZDNet 6 years ago
Bad Rabbit ransomware spread using leaked NSA EternalRomance exploit, researchers confirm http://zd.net/2gQaJzN https://t.co/lQc77LE61t
@ZDNet 6 years ago
Bad Rabbit ransomware spread using leaked NSA EternalRomance exploit, researchers confirm http://zd.net/2gNzwUQ @dannyjpalmer https://t.co/LTw6bN2ARq
@extremetech.com 6 years ago
Israel Caught Russian Hackers Using Kaspersky Software to Spy on the US
@WIRED 6 years ago
Here's one more reason to be scared of hotel Wi-Fi.
@WIRED 6 years ago
Here's one more reason to be scared of hotel Wi-Fi.
@WIRED 6 years ago
Here's one more reason to be scared of hotel Wi-Fi.
@newsbtc.com 6 years ago
DROPLEX offers a solution to the ‘quantum revolution’ by using a bulletproof blockchain
@thenextweb.com 6 years ago
NSA knew about the vulnerability exploited by NotPetya for over 5 years
@venturebeat.com 6 years ago
Group linked to NSA spy leaks that led to WannaCry threatens sale of fresh tech secrets
@newsbtc.com 7 years ago
Silk Road Bitcoin Funds Is Used For The Shadow Brokers Auction
@mashable.com 7 years ago
How researchers identified a heart condition using telephone metadata and search engines alone