Skip to main content

Home/ ITGSonline/ Group items matching "nsa" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
dr tech

Security Expert Bruce Schneier On Passwords, Privacy and Trust - 0 views

  •  
    "They aren't limited by human notions of attention; they can watch everyone at the same time. So while it may be true that using encryption is something the NSA takes special note of, not using it doesn't mean you'll be noticed less. The best defense is to use secure services, even if it might be a red flag. Think of it this way: you're providing cover for those who need encryption to stay alive."
dr tech

Lavabit competitor Silent Circle shuts down its secure email service, destroys servers - Boing Boing - 0 views

  •  
    "Silent Circle, a secure communications company founded by PGP creator Phil Zimmerman, has pre-emptively shut down its secure, encrypted email service and destroyed the servers so that it cannot be forced to reveal its customers' secrets to NSA spooks. "
dr tech

US National Security Agency used Heartbleed security flaw to spy on internet users - 11 Apr 2014 - Computing News - 0 views

  •  
    The US National Security Agency (NSA) knew of the Heartbleed flaw in the widely used OpenSSL security tool and exploited it for year - instead of blowing the whistle so that the patch could be flawed."
dr tech

MetaPhone: The Sensitivity of Telephone Metadata « Web Policy - 0 views

  •  
    "The dataset that we analyzed in this report spanned hundreds of users over several months. Phone records held by the NSA and telecoms span millions of Americans over multiple years. Reasonable minds can disagree about the policy and legal constraints that should be imposed on those databases. The science, however, is clear: phone metadata is highly sensitive."
dr tech

If you read Boing Boing, the NSA considers you a target for deep surveillance - Boing Boing - 0 views

  •  
    "America's National Security Agency gathers unfathomable mountains of Internet communications from fiber optic taps and other means, but it says it only retains and searches the communications of "targeted" individuals who've done something suspicious. Guess what? If you read Boing Boing, you've been targeted."
dr tech

What we know about 'Regin,' the powerful malware that could be the work of NSA - 0 views

  •  
    "Regin is a tool capable of infecting and compromising entire networks, not just individual computers, as security companies Symantec and Kaspersky Labs detailed in their technical reports published on Sunday and Monday. It's not only a computer virus or malware, but also a toolkit or platform that can be used for different purposes, depending on the needs of the attackers. It can collect passwords, retrieve deleted files, and even take over entire networks and infrastructures, according to researchers. "
maxresnikoff

Data trackers monitor your life so they can nudge you - tech - 07 November 2013 - New Scientist - 0 views

  • Once you know everything about a person, you can influence their behaviour.
  • The phones are tracking everywhere the students go, who they meet and when, and every text they send
julia barr

GCHQ and NSA 'track Google cookies' - 0 views

  •  
    The latest Snowden leak suggests US and UK cyberspies are taking advantage of Google's proprietary cookie technology in an effort to track suspects.
dr tech

The US fears back-door routes into the net because it's building them too | Technology | The Observer - 0 views

  •  
    "In a discussion of how to secure the "critical infrastructure" of the United States he described the phenomenon of compromised computer hardware - namely, chips that have hidden "back doors" inserted into them at the design or manufacturing stage - as "the problem from hell". And, he went on, "frankly, it's not a problem that can be solved"."
dr tech

US "suspected terrorist" database had 1.5M names added to it in past 5 years - Boing Boing - 0 views

  •  
    "99 percent of the names submitted to the list are accepted; the court called this "wildly loose." The database has grown from 227,932 names in 2009 to its current stratospheric heights. There is no official, public procedure for having your name removed from the list. The US government is seeking to end the trial by invoking state secrecy."
dr tech

Edward Snowden interview: breaking law was only option, says whistleblower | World news | theguardian.com - 0 views

  •  
    "In his most extensive public comments to date Snowden sought to answer critics who have said his actions damaged US national security or that the threat from the secret government surveillance he revealed was overblown. Snowden was interviewed by the NBC News anchor Brian Williams, who travelled to Moscow for the meeting"
‹ Previous 21 - 32 of 32
Showing 20 items per page