WikiLeaks releases CIA hacks of Apple Mac computers

The Central Intelligence Agency is able to permanently infect an Apple Mac computer so that even reinstalling the operating system will not erase the bug, according to documents published Thursday by WikiLeaks.

Italian surveillance company hacked, documents stolen

An Italian surveillance firm known for selling malicious software used by police bodies and spy agencies has succumbed to a cyberattack, the firm's spokesman said Monday, confirming an embarrassing breach which sent documents ...

Eyes on you: Experts reveal police hacking methods (Update 2)

Law enforcement agencies across the globe are taking a page out of the hacker's handbook, using targets' own phones and computers to spy on them with methods traditionally associated with cybercriminals, two computer security ...

NSA has 'industrial scale' malware for spying

The National Security Agency has developed malware that allows it to collect data automatically from millions of computers worldwide, a report based on leaked documents showed Wednesday.

Spy agency tracked Canadians at an airport (Update)

A secret document leaked by U.S. whistleblower Edward Snowden shows Canada's electronic spy agency used information gleaned from a free internet service at a Canadian airport to track the wireless devices of thousands of ...

Report: NSA broke into Yahoo, Google data centers (Update 2)

The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, a newspaper reported, citing documents obtained from former NSA contractor Edward ...

Report: NSA collecting millions of contact listss

The National Security Agency has been sifting through millions of contact lists from personal email and instant messaging accounts around the world—including those of Americans—in its effort to find possible links to ...

Report: NSA cracked most online encryption

The National Security Agency, working with the British government, has secretly been unraveling encryption technology that billions of Internet users rely upon to keep their electronic messages and confidential data safe ...

page 1 from 8