The US has made a dent in Russian cyber criminal gangs. But tensions with Russia and the shadowy nature of hacking keep the threat level high.
Researchers tried several times to have the document declassified, including in 1992, 2004 and 2016. It was initially written to help American NSA agents crack difficult coded messages.
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
Cyber attacks need two components – the tools to exploit vulnerabilities and the people with the expertise to deploy them.
The case for all things Tor.
The invasion of privacy through online surveillance can make people ignore the civil rights of others.
The latest release from WikiLeaks, of information about CIA hacking efforts, is yet another reminder of how Americans and our government must better protect our secret information.
The top cyberspy agency couldn’t stay immune from attacks forever. What does it mean for governments, companies and internet users as a whole that the NSA has been hacked?
Increased submarine activity is fuelling concerns at Russia’s capability to wage information warfare on the West.
The EU’s highest court invalidated a key data sharing agreement between the union and the US, exposing the deep cultural clash over privacy and surveillance.
End of Safe Harbour agreement isn’t the end of the world, and it might just mean a far better replacement is on its way.
With the end of the Safe Harbour agreement, data protection for their users will be more than a tick-box exercise for US firms.
The tactics used by America’s current and potential future enemies are constantly changing. Higher education can help by producing graduates able to work in intelligence communities.
If you’re surprised that the US is spying on France… don’t be.
Whether the story is true or not, we’ve seen that old threats still give intelligence agencies the jitters, even in the digital age.
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
US intelligence agencies can no longer collect and store the telecommunications data of US citizens but other countries are strengthening their efforts.
The Second Circuit Court of Appeals went beyond striking down the NSA’s metadata surveillance program; the court also created a road map for Congress to balance privacy and security issues
Can the NSA and GCHQ really listen to your phone? Should we be concerned if they could?
Mystery malware capable of hiding itself in a hard drives’ internal electronics has been revealed, having spread worldwide for more than a decade.