Hack of major data brokers weakens bank authentication
LexisNexis, Dun & Bradstreet and Kroll Background America hacks raise more doubt on the effectiveness of knowledge-based authentication
Antone Gonsalves | 27 Sep | Read more
LexisNexis, Dun & Bradstreet and Kroll Background America hacks raise more doubt on the effectiveness of knowledge-based authentication
Antone Gonsalves | 27 Sep | Read more
Strategy would make probing data flow expensive and hard, likely forcing the NSA to obtain a court order for targeted data
Antone Gonsalves | 10 Sep | Read more
The US is engaged in a wide-ranging campaign of cyber-operations against foreign targets, launching over 200 in 2011 alone, budget documents leaked by Edward Snowden to the Washington Post have confirmed.
John E Dunn | 05 Sep | Read more
The New York Times, Twitter, and other major sites were knocked offline yesterday in an attack by the Syrian Electronic Army (SEA). While there is certainly a political motivation to the hacks, there is an underlying lesson that all businesses should learn.
Tony Bradley | 28 Aug | Read more
A raid by the Syrian Electronic Army (SEA) on the Washington Post this week was aided by a successful phishing attack on the one of its journalists, the newspaper has confirmed. But how did the atttackers penetrate its defences?
John E Dunn | 19 Aug | Read more
The Syrian Electronic Army, just days after targeting the New York Post, has compromised Outbrain.com, a content recommendation platform, and used their access to target readers of the Washington Post, CNN, and Time with pro-Assad propaganda
Steve Ragan | 15 Aug | Read more
In an open letter published to Apple's website Sunday, the company outlined its policies for responding to government requests for information and promised to work to safeguard user privacy.
Dan Frakes | 17 Jun | Read more
Google has sent a letter to U.S. Attorney General Eric Holder and FBI director Robert Mueller seeking permission to disclose specific details about the information it is required to provide to the government in response to requests for user data from U.S. intelligence agencies.
Jaikumar Vijayan | 12 Jun | Read more
Debate continues to rage today over the bombshell revelations that the National Security Agency collects intelligence on individuals via telecommunications and social-networking sites. The uproar has the U.S. government and private companies admitting to some aspects of the surveillance, while vehemently denying others. A former CIA agent working for Booz Allen Hamilton has revealed himself as the leaker.
Ellen Messmer | 10 Jun | Read more
The Washington Post and Guardianlet a genie out of a bottle, and now the Obama administration's national security boss is making an effort to cram it back in.
Jon Phillips | 10 Jun | Read more
While the PRISM program appears to be legal, that does not make it good policy -- or good for international relations
Antone Gonsalves | 08 Jun | Read more
Thursday afternoon, a bombshell dropped: Two leading reports claimed that the U.S. government has been spying on emails, searches, Skype calls, and other electronic communications used by Americans for the last several years, via a program known as PRISM.
Mark Hachman | 08 Jun | Read more
President Barack Obama today forcefully defended the government's data collection activities, calling them vital to protecting the nation against terrorist attacks.
Jaikumar Vijayan | 07 Jun | Read more
For the last several years, the National Security Agency has been reportedly spying on the searches, emails, and file transfers of Americans using a program called PRISM--which tapped directly into the servers used by Apple, Google, Microsoft, and others.
Mark Hachman | 07 Jun | Read more
The FBI and the National Security Agency are tapping directly into servers at Microsoft, Google, Facebook, Skype and other major Internet companies to keep track of the communications and interactions of known and suspected foreign terrorists, the Washington Post reported.
Jaikumar Vijayan | 07 Jun | Read more