Intelligence

Intelligence

The U.S. National Security Agency's bulk collection and storage of phone metadata does not violate the U.S. Constitution, according to a federal judge's decision. The...

The NSA paid RSA $10 million to ensure a vulnerable encryption algorithm was used by default in RSA's BSAFE toolkit, this according to a...

The White House has decided to keep the positions of director of the National Security Agency and commander of U.S. Cyber Command together when...

So many spies in the chatrooms of games like World of Warcraft, they have to avoid running into each other. Now spies aren't just...

The U.S National Security Agency (NSA) is reported to have installed computer malware in 50,000 computer networks around the globe. Reports in theWashington Post,...

Revelations of the surveillance programs of the National Security Agency (NSA) and the U.K. Government Communications Headquarters (GCHQ) have sparked technical innovations, legal challenges,...

Digital privacy services such as encrypted e-mail, secure instant messaging, and services that provide hard-to-track IP addresses are enjoying a surge in demand as...

The National Security Agency is considering exposing the pornography viewing habits of Muslim "radicalizers," according to documents that the Huffington Post has obtained from...

An unprecedented MOU (Memorandum of Understanding) allowing Israel free access to raw data collected by the NSA, including all U.S. civilian communications, was secretly...

How can security forces deal with the astronomic amounts of video data collected by all sorts of different sensors? Over the past decade, technological...

Skycure, a mobile security software company, today introduced its mobile IDS/IPS solution, protecting iPhones and iPads by monitoring network traffic behavior and remediating suspicious...

McAfee announced the industry’s first “endpoint aware” security information event management (SIEM) solution that adds real time system state information to enhance situational awareness...

The National Security Agency (NSA) has repeatedly tried to develop attacks against people using Tor, a software tool designed to protect online anonymity –...

The government shutdown increases the risk of a cyber attack against the U.S. due to the fact that many workers who monitor threats have...

Israeli company, Simlat was selected to provide an UAS & ISR Training & Simulation Center for the Northland Imagery Analysis college program. Northland’s Imagery...

The recent disclosures about the U.S. intelligence agencies are causing more damage as time passes. As the nation’s spy agencies assess the fallout from disclosures...

Big Data does not necessarily mean Good Data. And that, as an increasing number of experts are saying more insistently, means Big Data does...

The NSA used ‘man in the middle’ hack attacks to impersonate Google and fool web users, leaks have revealed. The technique circumvents encryption by...

Germany’s Der Spiegel newspaper –joining the NSA revelations train – reported that the intelligence agency is interested in international credit card transactions and may...

The first two minutes of a cyberattack are crucial - that's when the attacker sets up camp and downloads additional malware to dig in...

A top secret intelligence budget justification leaked by former NSA contractor Edward Snowden depicts a U.S. Intelligence Community (IC) awash in unprecedented amounts of...

National Security Agency officers on several occasions have channeled their agency’s enormous eavesdropping power to spy on love interests, U.S. officials said. The practice isn’t...

Latest