Please read and agree to the
terms and conditions
of this site.
I agree
Government Cyber Security and Surveillance
/tech
Clear filters and search
Format
photo
text
Tags
nsa
1
security
surveillance
malware
section 702
china
cybersecurity
upstream collection
us government
1st amendment
4th amendment
about collection
aclu
analytics
artificialintelligence
backdoor searches
bitcoin
blockchain
book
btc
cia
citrix
cloud
cloudsecurity
computer security
crypto
crypto assets
cryptocurrencies
cryptocurrency
cyberattack
cybercrime
cyberrisk
cyberwarfare
databreach
dataprotection
department of energy
digital asset
digital currency
domestic surveillance
What
used
25
×
nsa
fbi
hackers
security
agency
state
china
day
government
surveillance
u.s
warning
access
backed
critical
data
devices
flaws
intelligence
malware
national
section
spy
tool
vulnerability
widely
windows
years
zero
according
agencies
allows
americans
attack
backdoor
brokers
cisa
claims
collect
Language
unset
25
×
Current search:
unset
×
used
×
@techdirt.com
1 month ago
Legislator Apparently Used Slides Of NYC Protests In His Pitch For Reauthorizing Section 702 Surveillance
@techcrunch.com
2 months ago
NSA says it’s tracking Ivanti cyberattacks as hackers hit US defense sector
@techdirt.com
6 months ago
Former DHS/NSA Official Stewart Baker Decides He Can Help NSO Group Turn A Profit
@neowin.net
11 months ago
Russia claims NSA used Apple backdoor vulnerabilities to spy on iPhone users
@techdirt.com
11 months ago
FBI Used Section 702 Surveillance Powers To Spy On Protesters, Crime Victims, And Political Party Donors
@techdirt.com
1 year ago
Supreme Court Denies Cert To NSA Case, Allows State Secret Privilege To Roll On Unaltered
@techcrunch.com
1 year ago
NSA says Chinese hackers are exploiting a zero-day bug in popular networking gear
@techdirt.com
1 year ago
Microsoft Says China Is Abusing Vulnerability Disclosure Requirements To Hoard Exploits
@zdnet.com
1 year ago
NSA, FBI warning: Beware these 20 software flaws most used by hackers
@eff.org
1 year ago
What is Fog Data Science? Why is the Surveillance Company so Dangerous?
@zdnet.com
1 year ago
NSA, FBI warning: Hackers are using these flaws to target VPNs and network devices
@techcrunch.com
2 years ago
US warns of state-backed malware designed to hijack critical infrastructure systems
@theregister.com
2 years ago
Anatomy of top-tier suspected NSA backdoor code
@zdnet.com
2 years ago
DOJ fines NSA hackers who assisted UAE in attacks on dissidents
@theregister.com
3 years ago
The perils of non-disclosure? China 'cloned and used' NSA zero-day exploit for years before it was made public
@wired.com
3 years ago
China Hijacked an NSA Hacking Tool—and Used It for Years
@techdirt.com
3 years ago
Patriot Act Used By The FBI To Collect Internet Browsing Data, Contradicting Claims Made To Oversight
@theregister.com
3 years ago
NSA: We've learned our lesson after foreign spies used one of our crypto backdoors – but we can't say how exactly
@zdnet.com
3 years ago
FBI and NSA expose new Linux malware Drovorub, used by Russian state hackers
@techdirt.com
4 years ago
This Week In Techdirt History: January 19th - 25th
@reach2ratan
4 years ago
Critical Windows Vuln Used To Rickroll The NSA And Github https://buff.ly/2Tz8wcD #CyberSecurity #Databreach #Cyberrisk #infosec @reach2ratan #AI #ML #malware #cloud #cloudsecurity #Machinelearning #Analytics #Blockchain #dataprotection #Privacy #ArtificialIntelligence https://t.co/aCERtwhSf7
@wired.com
4 years ago
A Windows 10 Vulnerability Was Used to Rickroll the NSA and Github
@news.bitcoin.com
4 years ago
Judge Rules Snowden Must Give Book Proceeds to US Government
@theregister.co.uk
4 years ago
NSA to Congress: Our spy programs don’t work, aren’t used, or have gone wrong – now can you permanently reauthorize them?
@cnet.com
4 years ago
Court finds FBI use of NSA database violated Americans' Fourth Amendment rights - CNET