Please read and agree to the
terms and conditions
of this site.
I agree
Government Cyber Security and Surveillance
/tech
Clear filters and search
Format
photo
link
text
Tags
security
nsa
apple
fbi
business
tc
iphone
mobile
privacy
tech
surveillance
insider
apple vs. fbi
cybersecurity
encryption
national security agency
1
government
ransomware
bitcoin
malware
mass surveillance
tim cook
china
computer security organizations
edward snowden
gadgets
government agencies established in 1949
hackers
hacking
news
russia
section 702
signals intelligence agencies
smartphones
supercomputer sites
u.s. government
uk
united states department of defense agencies
united states government secrecy
What
used
123
×
nsa
fbi
security
apple
iphone
san
bernardino
software
government
new
agency
hackers
u.s
data
national
according
help
snowden
spy
access
federal
phone
surveillance
unlock
attack
company
edward
encryption
hacking
intelligence
order
syed
case
court
farook
fight
group
read
using
Language
unset
Current search:
used
×
@techdirt.com
2 months ago
Legislator Apparently Used Slides Of NYC Protests In His Pitch For Reauthorizing Section 702 Surveillance
@techcrunch.com
3 months ago
NSA says it’s tracking Ivanti cyberattacks as hackers hit US defense sector
@techdirt.com
7 months ago
Former DHS/NSA Official Stewart Baker Decides He Can Help NSO Group Turn A Profit
@neowin.net
1 year ago
Russia claims NSA used Apple backdoor vulnerabilities to spy on iPhone users
@techdirt.com
1 year ago
FBI Used Section 702 Surveillance Powers To Spy On Protesters, Crime Victims, And Political Party Donors
@techdirt.com
1 year ago
Supreme Court Denies Cert To NSA Case, Allows State Secret Privilege To Roll On Unaltered
@techcrunch.com
1 year ago
NSA says Chinese hackers are exploiting a zero-day bug in popular networking gear
@techdirt.com
1 year ago
Microsoft Says China Is Abusing Vulnerability Disclosure Requirements To Hoard Exploits
@zdnet.com
1 year ago
NSA, FBI warning: Beware these 20 software flaws most used by hackers
@eff.org
1 year ago
What is Fog Data Science? Why is the Surveillance Company so Dangerous?
@zdnet.com
2 years ago
NSA, FBI warning: Hackers are using these flaws to target VPNs and network devices
@techcrunch.com
2 years ago
US warns of state-backed malware designed to hijack critical infrastructure systems
@theregister.com
2 years ago
Anatomy of top-tier suspected NSA backdoor code
@zdnet.com
2 years ago
DOJ fines NSA hackers who assisted UAE in attacks on dissidents
@theregister.com
3 years ago
The perils of non-disclosure? China 'cloned and used' NSA zero-day exploit for years before it was made public
@wired.com
3 years ago
China Hijacked an NSA Hacking Tool—and Used It for Years
@techdirt.com
3 years ago
Patriot Act Used By The FBI To Collect Internet Browsing Data, Contradicting Claims Made To Oversight
@theregister.com
3 years ago
NSA: We've learned our lesson after foreign spies used one of our crypto backdoors – but we can't say how exactly
@zdnet.com
3 years ago
FBI and NSA expose new Linux malware Drovorub, used by Russian state hackers
@techdirt.com
4 years ago
This Week In Techdirt History: January 19th - 25th
@reach2ratan
4 years ago
Critical Windows Vuln Used To Rickroll The NSA And Github https://buff.ly/2Tz8wcD #CyberSecurity #Databreach #Cyberrisk #infosec @reach2ratan #AI #ML #malware #cloud #cloudsecurity #Machinelearning #Analytics #Blockchain #dataprotection #Privacy #ArtificialIntelligence https://t.co/aCERtwhSf7
@wired.com
4 years ago
A Windows 10 Vulnerability Was Used to Rickroll the NSA and Github
@news.bitcoin.com
4 years ago
Judge Rules Snowden Must Give Book Proceeds to US Government
@theregister.co.uk
4 years ago
NSA to Congress: Our spy programs don’t work, aren’t used, or have gone wrong – now can you permanently reauthorize them?
@cnet.com
4 years ago
Court finds FBI use of NSA database violated Americans' Fourth Amendment rights - CNET
@cointelegraph.com
4 years ago
Edward Snowden Used Bitcoin to Pay for Servers Used in NSA Leak
@eff.org
4 years ago
The Lofgren-Amash Amendment Would Check Warrantless Surveillance
@cnet.com
5 years ago
Stolen NSA hacking tool now victimizing US cities, report says - CNET
@theverge.com
5 years ago
Hackers used a tool developed by the NSA to attack Baltimore’s computer systems
@zdnet.com
5 years ago
Chinese hackers were using NSA malware a year before Shadow Brokers leak
@wired.com
5 years ago
The Strange Journey of an NSA Zero-Day Vulnerability—Into Multiple Enemies' Hands
@polygon.com
5 years ago
With a little patience, and some NSA software, you too can mod your PC lighting
@techcrunch.com
5 years ago
Hackers are using leaked NSA hacking tools to quietly hijack thousands of computers
@mashable.com
6 years ago
Chinese messaging app WeChat banned by Australia's Defence Force
@theverge.com
6 years ago
Senate passes bill to renew controversial NSA spying powers
@mashable.com
6 years ago
Meet Bad Rabbit, the new ransomware that used an NSA exploit to wreak havoc
@theverge.com
6 years ago
How an antivirus program could accidentally smuggle government secrets into Russia
@mashable.com
6 years ago
Russian hackers reportedly used popular antivirus software to steal NSA data
@ZDNet
6 years ago
WSJ: Kaspersky software likely used in Russian-backed NSA breach http://zd.net/2z0akij by @stephcondoncbs https://t.co/4kcx7GBYUP
@theverge.com
6 years ago
Russian hackers used Kaspersky software to find vulnerable NSA docs, says report
@venturebeat.com
7 years ago
Group linked to NSA spy leaks that led to WannaCry threatens sale of fresh tech secrets
@venturebeat.com
7 years ago
Stolen U.S. spy agency tool used to launch global cyberattack
@extremetech.com
7 years ago
New Ransomware Attack Used Leaked NSA Exploits to Hit NHS
@venturebeat.com
7 years ago
Hackers reveal how the NSA exploited weaknesses in software to breach the global money transfer system
@techcrunch.com
7 years ago
Alleged NSA hack group Shadow Brokers releases new trove of exploits
@techcrunch.com
7 years ago
Shadow Brokers post list of compromised IP addresses
@extremetech.com
7 years ago
Feds demand fingerprints from all home residents to unlock their phones
@venturebeat.com
7 years ago
NSA hacking tools were reportedly left unprotected on remote computer
First
Prev
Page 1
(current)
Next
Last