Attention B2B Marketers: Access 30 Million IT Decision Makers with a Custom Lead Generation Program Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com

Results 1-20 of 385 for NSA (0.001 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

David Jones
Report: Russian Hackers Penetrated Elite NSA Hacking Division
10/07/17 11:00 AM PT | TechNewsWorld | 900 Words

The information included hacking tools and other sensitive data that the NSA used to gather intelligence overseas.

The contractor worked in the NSA's Tailored Access Operations unit, an elite hacking division in the agency. There is no evidence the contractor planned to...

Richard Adhikari
NSA's Auroragold Mining Operation
12/10/14 7:39 AM PT | TechNewsWorld | 668 Words

Documents released by whistle-blower Edward Snowden show the NSA has monitored more than 1,200 email accounts associated with major cellphone network operators worldwide since 2010, in a covert operation named "Auroragold," according to the report.

Those intercepted communications help the NSA hack...

Richard Adhikari
NSA Deploys Botnet Armies, Spoofs Facebook
03/13/14 3:46 PM PT | TechNewsWorld | 682 Words

... latest Snowden revelations about NSA surveillance activities indicate the agency could infect millons of computers with malware, and has spoofed Facebook servers to capture traffic from targets. Documents previously leaked by NSA whistleblower Edward Snowden include detailed descriptions of its tools and...

Richard Adhikari
For NSA, Americans' Emails Are an Open Book
08/09/13 5:00 AM PT | TechNewsWorld | 626 Words

... NSA is reading communications between Americans and foreigners abroad, despite its denials, The New York Times reported. The NSA responded to the allegations by stating its activities are lawful attempts to gather intelligence about foreign powers and their agents, foreign organizations, foreign...

Richard Adhikari
Warning Sony of Coming Storm Wasn't NSA's Department
01/19/15 1:33 PM PT | TechNewsWorld | 652 Words

The NSA apparently penetrated North Korea's network through several vectors, including Chinese networks used to connect with the rest of the world and hacker connections in Malaysia. The NSA was able to burrow in using the networks of South Korea and other allies.

Richard Adhikari
NSA's Eyes Trained Less on Terrorists Than on Average Joes and Janes
07/07/14 2:08 PM PT | TechNewsWorld | 620 Words

Data provided by former NSA contractor Edward Snowden includes some information pertaining to terrorist activities and possible threats to U.S. national security, as well as a few successes in antiterrorist work. However, a four-month-long investigation by the publication found that many files retained...

Richard Adhikari
NSA Harvests 5 Billion Cellphone Locations Worldwide Daily: Report
12/05/13 3:00 PM PT | TechNewsWorld | 564 Words

The information, obtained from documents released by NSA whistleblower Edward Snowden, indicate the records are stored in the agency's FASCIA database.

Data on Americans' cellphones both in the U.S. and abroad is collected "incidentally," the NSA contended.

"There's no restriction on...

Peter Suciu
NSA Caught Siphoning Data from Google, Yahoo Servers
10/31/13 12:08 PM PT | TechNewsWorld | 872 Words

Included in the data culled by the NSA is information on hundreds of millions of users, many of whom are American, the Post reported, citing documents obtained by NSA contractor Edward Snowden along with interviews with other officials.

The NSA's acquisition directorate...

Richard Adhikari
NSA Helps Itself to Americans' Online Address Books
10/15/13 4:16 PM PT | TechNewsWorld | 621 Words

When information passes through overseas collection points, the NSA assumes people whose email is being spied upon are not U.S. people , an unnamed official told The Washington Post .

"The NSA's mass collection of address book information is a significant...

David Jones
NSA Keeps Some Security Bugs Under Its Hat
11/10/15 5:00 AM PT | TechNewsWorld | 907 Words

In fact, the NSA's revelations have raised far more questions than they've answered.

The disclosures came late last month in an infographic touting the way the agency's security bug reporting practices.

Disclosing vulnerabilities usually makes sense, it reads, "but there...

John P. Mello Jr.
Lawsuit Challenges NSA Internet Dragnets
03/13/15 11:02 AM PT | E-Commerce Times | 835 Words

Using a technique called "upstream" surveillance, the NSA does a spinal tap of the Internet's U.S. backbone, which carries the communications of millions of Americans, the ACLU explained in its complaint filed with a federal district court in Maryland.

"In the course...

Katherine Noyes
The Blackphone vs. the NSA
01/20/14 9:19 AM PT | LinuxInsider | 1391 Words

President Obama's momentous speech proposing NSA reforms wasn't the only clarion call last week. We also heard from Mozilla, which appealed to security researchers around the world to help ensure that Firefox source code remain unadulterated and backdoor-free.

"Mozilla has one critical...

John P. Mello Jr.
Snowden and the NSA Gets Curiouser and Curiouser
06/08/16 3:35 PM PT | TechNewsWorld | 731 Words

... Snowden made a greater effort than originally believed to raise his concerns within the NSA before releasing thousands of classified documents detailing programs that allowed the agency to spy on U.S. citizens. The truth is more complex than the NSA let on,...

Richard Adhikari
AT&T Went Above and Beyond for NSA, Say Snowden Docs
08/18/15 5:00 AM PT | E-Commerce Times | 572 Words

The information about the company's close ties with the agency came from the trove of documents released by NSA whistleblower Edward Snowden. AT&T, which NSA lauded for its "extreme willingness to help," gave the agency access through several methods to billions of emails...

Richard Adhikari
NSA Hackers Help Themselves to Google's Cookies
12/12/13 8:38 AM PT | TechNewsWorld | 620 Words

... United States National Security Agency is using at least one type of Google cookie -- PREF, which stores a user's preferences -- to home in on the PCs of targets it wants to hack, according to a Washington Post report. NSA's ...

Chris Maxcer
AT&T Tech Paints Stark Picture of NSA Telecom Spying
11/07/07 1:33 PM PT | E-Commerce Times | 1014 Words

When Klein worked for AT&T in 2002, he said he received e-mails from higher management advising technicians of a special visit from the NSA and that an NSA agent was going to interview another technician for a "special job." In January 2003, he...

Rob Enderle
From the Olympic Non-Robbery to Ford Getting Out of Cars, to Evil NSA: A Strange Week
08/22/16 10:37 AM PT | TechNewsWorld | 1557 Words

The third is an NSA leak that has me wondering if we should reclassify the NSA as a criminal organization.

I'll share some observations on all three and close with my product of the week: a new drone equipped with technology...

Richard Adhikari
How Cozy Are Google and the NSA?
02/05/10 11:54 AM PT | TechNewsWorld | 901 Words

The Washington Post broke the story that Google had turned to the NSA on Thursday, citing anonymous sources.

Security experts and privacy advocates have questioned Google's motives. Some have warned that this could constitute another attack on American citizens' civil liberties. Others...

David Vranicar
NSA Lifts Middle Finger to Middle Kingdom
03/24/14 9:31 AM PT | TechNewsWorld | 544 Words

Like the one about the NSA tapping German Chancellor Angela Merkel's phone. Or the one about the NSA planting agents inside fantasy worlds in World of Warcraft , or impersonating Facebook in a global quest to spread malware.

Delicious as all those...

John P. Mello Jr.
Encryption Lets NSA Store Your Email Forever
10/08/13 5:00 AM PT | TechNewsWorld | 1154 Words

... you want to prolong your email's stay with the NSA, just encrypt it. Among the documents leaked by whistleblower Edward Snowden is one describing the National Security Agency's treatment of communication it intercepts authored by U.S. citizens. In short, if the...

1 2 3 4 5 6 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
What is the most consequential impact of social media on society today?
It has opened up valuable new channels for civil discourse.
It has destroyed the meaning of "truth" and "fact."
It has made people stronger by facilitating grass roots activism.
It has deepened divisions among groups with opposing views.
It has made it easier for people to support and help each other.
It has made it easier for people to humiliate and hurt each other.