National security vs. online privacy

One method for safeguarding online anonymity is Tor, "the onion router", whose name comes from its method of adding and stripping away encryption layer by layer as messages pass from one node to another in the network en ...

NSA director: US needs Silicon Valley's expertise

U.S. intelligence depends on Silicon Valley innovation for technologies that strengthen the Internet and staff to provide national cybersecurity, National Security Agency director Mike Rogers told Stanford University professors ...

Report: NSA eyed preset strikes in cyberattacks

The National Security Agency secretly planned a cyberwarfare program that could automatically fire back at cyberattacks from foreign countries without any human involvement, creating the risk of accidentally starting a war, ...

US spying revelations bring German encryption boom (Update)

Revelations about the U.S. National Security Agency's electronic eavesdropping capabilities have sparked anger in Germany and a boom in encryption services that make it hard for the most sophisticated spies to read emails, ...

Security contractor says hit by computer breach

A government contractor that handles hundreds of thousands of security clearance background checks for civilian and military workers says that some workers' personal information was compromised after a recent computer breach.

Microsoft challenging US on overseas data

In a case closely watched by the tech sector, Microsoft will challenge Thursday a US court order requiring it to give prosecutors electronic mail content associated with an overseas server.

US spy agency patents car seat for kids

Electronic eavesdropping is the National Security Agency's forte, but it seems it also has a special interest in children's car seats, Foreign Policy magazine reported Wednesday.

Report: US spies on prominent Muslim-Americans

An online magazine reported Wednesday that the National Security Agency and the FBI covertly scanned the emails of five prominent Muslim-Americans under the government's secret surveillance program aimed at foreign terrorists ...

Eyes on you: Experts reveal police hacking methods (Update 2)

Law enforcement agencies across the globe are taking a page out of the hacker's handbook, using targets' own phones and computers to spy on them with methods traditionally associated with cybercriminals, two computer security ...

page 6 from 18