The U.S. National Security Agency's bulk collection and storage of phone metadata does not violate the U.S. Constitution, according to a federal judge's decision.
The...
The U.S National Security Agency (NSA) is reported to have installed computer malware in 50,000 computer networks around the globe. Reports in theWashington Post,...
Revelations of the surveillance programs of the National Security Agency (NSA) and the U.K. Government Communications Headquarters (GCHQ) have sparked technical innovations, legal challenges,...
Digital privacy services such as encrypted e-mail, secure instant messaging, and services that provide hard-to-track IP addresses are enjoying a surge in demand as...
The National Security Agency is considering exposing the pornography viewing habits of Muslim "radicalizers," according to documents that the Huffington Post has obtained from...
An unprecedented MOU (Memorandum of Understanding) allowing Israel free access to raw data collected by the NSA, including all U.S. civilian communications, was secretly...
How can security forces deal with the astronomic amounts of video data collected by all sorts of different sensors? Over the past decade, technological...
Skycure, a mobile security software company, today introduced its mobile IDS/IPS solution, protecting iPhones and iPads by monitoring network traffic behavior and remediating suspicious...
McAfee announced the industry’s first “endpoint aware” security information event management (SIEM) solution that adds real time system state information to enhance situational awareness...
The National Security Agency (NSA) has repeatedly tried to develop attacks against people using Tor, a software tool designed to protect online anonymity –...
Israeli company, Simlat was selected to provide an UAS & ISR Training & Simulation Center for the Northland Imagery Analysis college program. Northland’s Imagery...
The recent disclosures about the U.S. intelligence agencies are causing more damage as time passes.
As the nation’s spy agencies assess the fallout from disclosures...
The NSA used ‘man in the middle’ hack attacks to impersonate Google and fool web users, leaks have revealed. The technique circumvents encryption by...
Germany’s Der Spiegel newspaper –joining the NSA revelations train – reported that the intelligence agency is interested in international credit card transactions and may...
A top secret intelligence budget justification leaked by former NSA contractor Edward Snowden depicts a U.S. Intelligence Community (IC) awash in unprecedented amounts of...
National Security Agency officers on several occasions have channeled their agency’s enormous eavesdropping power to spy on love interests, U.S. officials said.
The practice isn’t...