NSA Leak
The National Security Agency essentially bribed an important industry computer and network security firm to put a secret backdoor in their encryption formulas, according to a new report.
In yet another chapter regarding the United States' international espionage, information recently came to light that in 2007, the NSA made a list of six priority objectives it should spy on.
The National Security Agency has been trying to hack into Tor networks, according to a new report by The Guardian's NSA watcher Glenn Greenwald. Ironically, the NSA's attempts to hack the online anonymity tool are an example of one U.S. government agency trying to defuse something promoted by another U.S. Federal agency.
"I cross-referenced his YouTube profile through his MySpace..." - Kyle Broflovski. The kids of South Park had it right six years ago, using social media to track down terrorists. Three years later, in 2010, the National Security Agency began creating sophisticated graphs identifying the social connections of some Americans.
Google might not track you anymore - using cookies, that is. A recent report says that Google is considering changing the way it tracks online browsing activities, retiring the "cookie" and replacing it with an anonymous identifier called AdID.
Documents released Tuesday show that United States NSA officials accessed information to thousands of phone records that they didn't have legal authority to inspect, according to a report by the Miami Herald.
The details about the National Security Agency's cyber surveillance efforts continue to emerge after the Edward Snowden NSA leak earlier this summer. Each subsequent report about the NSA's powers seem to describe even more sweeping cyber surveillance capabilities than before, and this time is no different.
The details for the $52.6 billion budget for covert action, surveillance, intelligence and counterintelligence were leaked by Edward Snowden
In the wake of NSA agent Edward Snowden's revelations that government project PRISM allows the government to tap phone calls, email, and web browsing of any citizen without a warrant, private internet customers are increasingly turning to Tor, an anonymity network that allows people to securely browse without fear of being hacked.
After Edward Snowden exposed the NSA's PRISM program, which involved several top technology companies' cooperation, those companies began disclosing information and demanding permission from the government to be more transparent with their customers. But perhaps the newest revelation wasn't the kind of transparency they wanted.
A new report by The Guardian exposes the latest National Security Agency program which the media outlet claims grants intelligence analysts access to spy on Americans from a computer terminal.
Snowden Run 3D gives players the chance to experience an endless run style game featuring the NSA leak source.
A bill aimed at curbing the National Security Agency's ability to monitor the telephone records and Internet usage of millions of Americans was struck down by the House of Representatives on Wednesday.