News tagged with security agencies

Ex-DHS official warns of more USIS breach victims

A former senior Department of Homeland Security official says the hacking incident that compromised the private files of more than 25,000 DHS workers also exposed data belonging to numerous workers at other federal agencies.

dateNov 13, 2014 in Security
shares0 comments 0

Federal government struggles against cyberattacks

A $10 billion-a-year effort to protect sensitive government data, from military secrets to Social Security identification numbers, is struggling to keep pace with an increasing number of cyberattacks and ...

dateNov 10, 2014 in Security
shares0 comments 5

National security vs. online privacy

One method for safeguarding online anonymity is Tor, "the onion router", whose name comes from its method of adding and stripping away encryption layer by layer as messages pass from one node to another ...

dateNov 07, 2014 in Security
shares0 comments 0

Court: UK spies get bulk access to NSA data

The British government's insistence that its spies don't use the vast espionage powers of the U.S. National Security Agency to sidestep U.K. restrictions on domestic eavesdropping was called into question by a court document ...

dateOct 29, 2014 in Security
shares0 comments 0

Samsung phones cleared for US government use

Samsung Electronics Co. said Tuesday some of its Galaxy mobile devices were approved by the National Security Agency for use with classified U.S. government networks and data, a boost to the company's efforts to expand in ...

dateOct 21, 2014 in Consumer & Gadgets
shares0 comments 0

Sen. Wyden: NSA tech spying hurts economy

Google Chairman Eric Schmidt and other Silicon Valley executives say controversial government spying programs are undercutting the Internet economy and want Congress to step up stalled reform.

dateOct 08, 2014 in Business
shares0 comments 0

A digital safe for sending confidential documents

To secure the storage and transfer of documents, two post-docs at EPFL have recently developed three solutions. The solutions use encryption to render documents inaccessible to anyone who does not possess ...

dateOct 03, 2014 in Security
shares0 comments 0