What the other Four Eyes make of Australia’s encryption crackdown
Australia will push “thwarting the encryption of terrorist messaging” at a meeting of the Five Eyes nations in Canada this week.
Australia will push “thwarting the encryption of terrorist messaging” at a meeting of the Five Eyes nations in Canada this week.
Cisco is working to build the confidence of prospective customers in its products, two years after the NSA spying disclosures seeded doubt, particularly in China.
The U.S. National Security Agency will lose access to the bulk telephone records data it has collected at the end of November, the Office of the Director of National Intelligence announced Monday.
The Internet is a pit of epistemological chaos. As Peter Steiner posited -- and millions of chuckles peer-reviewed -- in his famous New Yorker cartoon, there's no way to know if you're swapping packets with a dog or the bank that claims to safeguard your money. To make matters worse, Edward Snowden has revealed that the NSA may be squirreling away a copy of some or all of our packets, and given the ease with which it can be done, other countries and a number of rogue hacker groups may very well be following the NSA's lead.
Just as the industry is becoming more comfortable with SDNs, the NSA says it's using them too.
Some of the world's best known cryptographers veterans of the crypto wars of the 1990s say government access to encryption keys is still a bad idea, but is an issue that will never go away because it's something intelligence agencies crave.
Meet Jesse Nunez, an avid opponent of bloatware on smartphones.
According to Richard Stallman, godfather of the free software movement, Facebook is a "monstrous surveillance engine," tech companies working for patent reform aren't going nearly far enough, and parents must lobby their children's schools to keep data private and provide free software alternatives.
A U.S. Senator is questioning why the Federal Communications Commission (FCC) approved of a controversial cell phone surveillance device that both federal and state law enforcement agencies are using to track suspects, often without court orders to do so.
Australian Privacy Commissioner Timothy Pilgrim is investigating reports about SIM card encryption keys – including those of SIM cards used in Australia – having been allegedly hacked by United States and United Kingdom intelligence agencies during 2010 and 2011.
The Equation Group's ability to reprogram hard-drive firmware leaves corporate security pros unable to trust the devices because they can't tell whether disks have been compromised or not.
Malware intentionally created by the U.S. National Security Agency to infect personal computer hard disk drives (HDDs) and solid-state drives (SSDs) cannot be detected by antivirus programs.
The Equation cyberespionage group that used tools similar to those deployed in the past by U.S. intelligence agencies appears to have targeted Macs as well as Windows PCs, Moscow-based Kaspersky Lab said yesterday.
Corporations will be asked to contribute cyber intelligence to a new federal agency tasked with analyzing threat data culled from as many public and private sources as possible in order to more quickly spot attacks and attribute them to the guilty parties.
The cyberattack on Sony Pictures late last year, which the FBI has attributed to North Korean hackers, represented a major escalation in digital hostilities that could reignite the long-simmering policy debate over how to better protect systems in the public and private sectors, a panel of former top intelligence officials said..