Two encrypted email services have shut down because they feel threatened about having to turn over customer information to the government. Lavabit and Silent Circle both offered encrypted email services, but both have decided to ...
Tags: Email Vendor, Physical Ties
A skeptical but mostly respectful crowd of Black Hat security attendees Wednesday listened intently as National Security Agency Director Keith Alexander defended controversial U.S. surveillance programs in a keynote address. The nearly ...
Tags: NSA Spy Programs
Microsoft has detailed the next software update to its Windows Phone 8 mobile operating system. The next update (GDR2) to Windows Phone 8 will be coming soon but with only minor changes for users to enjoy. Unfortunately Microsoft hasn't ...
Tags: Microsoft, Windows Phone 8, Phone
Yunique Solutions, creator of YuniquePLM product lifecycle management software, announces the launch of YuSnap mobile app. Specifically developed for iOS devices, YuSnap enables collaborators to snap photos and instantly synchronize them ...
Tags: Mobile APP, APP, Textile
The recently revealed mass collection of phone records and other communications by the U.S.National Security Agency may not be effective in preventing terrorism,according to some critics. The data collection programs,as revealed by former ...
Tags: NSA, Data Collection, terrorism, phone records
Recent leaks about surveillance programs at the U.S. National Security Agency show an agency with little regard for the U.S. Constitution and laws on the books, two past NSA leakers said Wednesday. Leaks by former NSA contractor Edward ...
Tags: NSA Leakers, Privacy Violations
More secret National Security Agency documents leaked by Edward Snowden to The Guardian suggest that the U.S. agency's British counterpart intercepts petabytes worth of communication data daily from fiber-optic cables. The operation ...
Yahoo has received between 12,000 to 13,000 requests for user data from law enforcement agencies in the U.S. between Dec. 1 and May 31 this year, the company said Monday. The most common of these requests concerned fraud, homicides, ...
Tags: Yahoo, User Data, Law Enforcement Agencies
The National Security Agency is creating new processes aimed at making it harder for systems administrators to misuse privileged access to agency systems, NSA officials told the U.S. House Intelligence Committee Tuesday. NSA director ...
Tags: NSA, 2-Person Rule
At least two U.S. mobile operators, T-Mobile US and Verizon Wireless, reportedly do not participate directly in the U.S. National Security Agency's call metadata collection program because of their partial ownership by foreign ...
Tags: Phone Companies, NSA, Surveillance Program
The National Security Agency has been allowed by a court order to collect phone records of a large number of customers of Verizon, according to a report in the Guardian on Thursday. The April 25 order from the U.S. Foreign Intelligence ...
Tags: Computer Products, US, Call Records
Control4 makes whole-home music streaming easier for everyone in the house with the new Control4 Wireless Music Bridge. The new product enables you, your family and guests to instantly and wirelessly connect smartphones, tablets or ...
WASHINGTON -- One of the computer scientists who turned on the Internet in 1983, Vinton Cerf, is concerned that much of the data created since then, and for years still to come, will be lost to time. Cerf warned that digital things ...
Tags: Vinton Cerf, Digital Data
Blue Coat Systems, a provider of Web traffic filtering and business assurance products and services, plans to buy security analytics specialist Solera Networks, which uses data mining techniques to classify network traffic and detect ...
Esko has announced the availability of the latest release of its structural packaging design software ArtiosCAD Enterprise, globally. According to the company, all assets are stored in a centralized yet private corporate database in the ...
Tags: Esko, Packaging Software