The U.S. National Security Agency was developing a software implant in 2008 for Apple iPhones that allowed the agency to take almost total control of the device, including retrieving text messages and voicemail and remotely turning on its ...
Tags: iPhones, Backdoor Access
A government and industry team led by engineers from the US Air Force Research Laboratory’s Materials and Manufacturing Directorate (AFRL/RX) has completed a program to assess, improve, refine and validate a domestic source of supply ...
Tags: Electrical, Electronics
Two years ago,the U.S.Congress mandated that the Federal Aviation Administration integrate robotic aircraft into national airspace by 2015.The FAA has since taken only baby steps toward that goal,but the topic has already sparked much ...
Tags: drone, U.S.Congress, robotic aircraft, national airspace
Apple said Tuesday it had no "backdoor" in its products after a security researcher and a leaked document suggested the US National Security Agency had unfettered access to the iPhone. Apple said in an email to AFP that it "has never ...
A German magazine lifted the lid on the operations of the National Security Agency's hacking unit Sunday, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's internal ...
Tags: National Security Agency's hacking unit, Tailored Access Operations
What kind of telephone activity does the NSA collect on people? Metadata. How harmful is it to your privacy health? Nada. It is only metadata. That has been the line drawn in the sand by government supporters of NSA activities in monitoring ...
Tags: telephone activity, Metadata, MetaPhone, monitor calls
The ban on U.S. pork and beef exports to Russia over ractopamine is costly for American producers, but not as much as was recently reported by the U.S. Ambassador. U.S. Ambassador to Russia Michael McFaul told a Moscow business newspaper ...
Tags: Agriculture, Food
Critics of the U.S. National Security Agency's bulk collection of U.S. residents' telephone records should offer a better way to track terrorists and protect the country against attacks, the agency's director said Wednesday. The NSA's ...
Tags: Metadata, NSA, data collection, surveillance programmes, surveillance
L-3 MAPPS announced today that it has won an order from Electrabel S.A. for the supply of a full scope operator training simulator for the Tihange 1 nuclear power plant located in the Walloon province of Liège, Belgium. The project ...
Tags: Nuclear News, L-3 MAPPS, Simulator Project
Eight top tech companies in the U.S. have asked governments around the world to reform surveillance laws and practices, and asked the U.S. to take the lead. AOL, Apple, Facebook, Google, LinkedIn, Twitter, Yahoo and Microsoft said Monday ...
Prime Minister David Cameron is to enter talks with China over cyber spying after raising the issue with Chinese Prime Minister Li Keqiang during his visit to the country. It follows on from a long-running war of words between the US and ...
Tags: Cyber Spying, Talks with China
In recent years, with the rapid development of video surveillance,security cameras made in China with a high quality and good effects have been widely favored by the users and influenced by foreign counterparts attention. After several ...
Tags: Security Cameras, Security, Protection, IP Camera, IR Camera, CCTV Camera
Over 3,000 firms have signed up to the Safe Harbor deal. The European Union (EU) has confirmed plans not to withdraw from the 'Safe Harbor' deal on data protection, which allows the US firms to access European data, snubbing demands for a ...
Following reports about U.S. surveillance worldwide, a United Nations panel has adopted a draft resolution on potential threats to human rights such as the right to privacy in the digital age. The draft resolution, approved without a ...
Microsoft is planning end-to-end encryption of its internet traffic following concerns that the company had its network security breached as part of the National Security Agency's (NSA) internet surveillance programme. The revelation, ...
Tags: Microsoft, ramp up, encryption, combat, NSA, surveillance