Apple said Tuesday it had no "backdoor" in its products after a security researcher and a leaked document suggested the US National Security Agency had unfettered access to the iPhone. Apple said in an email to AFP that it "has never ...
A German magazine lifted the lid on the operations of the National Security Agency's hacking unit Sunday, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's internal ...
Tags: National Security Agency's hacking unit, Tailored Access Operations
What kind of telephone activity does the NSA collect on people? Metadata. How harmful is it to your privacy health? Nada. It is only metadata. That has been the line drawn in the sand by government supporters of NSA activities in monitoring ...
Tags: telephone activity, Metadata, MetaPhone, monitor calls
Critics of the U.S. National Security Agency's bulk collection of U.S. residents' telephone records should offer a better way to track terrorists and protect the country against attacks, the agency's director said Wednesday. The NSA's ...
Tags: Metadata, NSA, data collection, surveillance programmes, surveillance
On any given day cybercriminals and nation states are in possession of as many as 100 zero-day software exploits known only to them, NSS Labs has calculated using the commercial vulnerability market as a baseline. NSS Labs research ...
Tags: Computer Products, software
Eight top tech companies in the U.S. have asked governments around the world to reform surveillance laws and practices, and asked the U.S. to take the lead. AOL, Apple, Facebook, Google, LinkedIn, Twitter, Yahoo and Microsoft said Monday ...
Microsoft is to invest €170m (£141m) to expand its Europe, Middle East and Africa (EMEA) data centre in Dublin, Ireland. The expansion is scheduled to be completed by spring 2014, and will create 380 construction jobs and 20 ...
Over 3,000 firms have signed up to the Safe Harbor deal. The European Union (EU) has confirmed plans not to withdraw from the 'Safe Harbor' deal on data protection, which allows the US firms to access European data, snubbing demands for a ...
Following reports about U.S. surveillance worldwide, a United Nations panel has adopted a draft resolution on potential threats to human rights such as the right to privacy in the digital age. The draft resolution, approved without a ...
Microsoft is planning end-to-end encryption of its internet traffic following concerns that the company had its network security breached as part of the National Security Agency's (NSA) internet surveillance programme. The revelation, ...
Tags: Microsoft, ramp up, encryption, combat, NSA, surveillance
The UK's biggest companies are not considering cyber risks in their decision making, according to a new survey from the Department for Business, Innovation and Skills. The survey, dubbed the cyber governance health check, was sent by the ...
Tags: UK, FTSE, cyber risks, Government
Cambridgeshire County Council has selected Ipswitch File Transfer's MOVEit solution to securely transfer its data and manage information across 100 locations. The council transfers data across a shared network of five districts, 69 ...
Tags: Cambridgeshire, county, council, Ipswitch, MOVEit, solution, transfer
The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber optic cables that transport Internet traffic ...
Tags: NSA, compromise, network, worldwide
Microsoft has announced that it will introduce message encryption for its cloud-based Office 365 service in early 2014. Dubbed Office 365 Message Encryption, the system will automatically encrypt email to anyone outside a company ...
Tags: Computer Products, software, Office 365, Microsoft
The US National Security Agency (NSA) propagated malware around the world in a bid to infiltrate and compromise more than 50,000 networks. The claim is the latest in the Edward Snowden disclosures and published in the German newspaper ...
Tags: Computer Products, software