Tag Archive for: building

Apple hack exposes flaws in building apps behind ‘Great Firewall’

BEIJING (Reuters) – China’s “Great Firewall” may have been partly to blame for the first major attack on Apple Inc’s App Store, but experts also point the finger at lax security procedures of some big-name Chinese tech firms and how Apple itself supports …
mac hacker – read more

Iran Rapidly Building Cyber Warfare Capabilities – Washington Free Beacon


Washington Free Beacon

Iran Rapidly Building Cyber Warfare Capabilities
Washington Free Beacon
Iran is rapidly building cyber warfare capabilities and recent reports suggest Tehran is set to conduct cyber attacks on global critical infrastructures, according to a State Department security report. The internal report sent to U.S. businesses last

cyber warfare – read more

North Korea Building An Army Of Hackers, Conducting Cyber-Warfare From … – The Inquisitr


The Inquisitr

North Korea Building An Army Of Hackers, Conducting CyberWarfare From
The Inquisitr
North Korea has recently increased its cyberwarfare divisions, doubling the communist nation's elite cyber warfare branch, according to an AFP report out of Seoul. The cyber warfare unit has been bolstered to 5,900 personnel whose focus involves
Korea vulnerable to cyberwarfareThe Korea Herald
N. Korea doubles number of cyber warriors over 2 years: sourcesGlobalPost

all 56 news articles »

cyber warfare – read more

Building a panopticon: The evolution of the NSA’s XKeyscore

Like this prison in Cuba, the NSA has turned the Internet into a place where the watchmen can see all.
Friman

The National Security Agency’s (NSA) apparatus for spying on what passes over the Internet, phone lines, and airways has long been the stuff of legend, with the public catching only brief glimpses into its Leviathan nature. Thanks to the documents leaked by former NSA contractor Edward Snowden, we now have a much bigger picture.

When that picture is combined with federal contract data and other pieces of the public record—as well as information from other whistleblowers and investigators—it’s possible to deduce a great deal about what the NSA has built and what it can do.

We’ve already looked at the NSA’s basic capabilities of collecting, managing, and processing “big data.” But the recently released XKeyscore documents provide a much more complete picture of how the NSA feeds its big data monsters and how it gets “situational awareness” of what’s happening on the Internet. What follows is an analysis of how XKeyscore works and how the NSA’s network surveillance capabilities have evolved over the past decade.

Read 19 remaining paragraphs | Comments


    


Ars Technica » Technology Lab