Tag Archive for: NSA’s

Shadow Brokers re-emerge, with NSA’s secret exploits for sale

Shadow Brokers re-emerge, with NSA’s secret exploits for sale

Having failed in its attempt to auction off a collection of hacking tools, implants and software exploits stolen from the NSA, the mysterious Shadow Brokers group are now offering them individually for sale on the web.

Read more in my article on the Hot for Security blog.

Graham Cluley

Untangling the NSA’s latest alleged embarrassment – Engadget – Engadget


Engadget

Untangling the NSA's latest alleged embarrassment – Engadget
Engadget
Last week, security researcher Mikko Hypponen found a notice on Github from an entity called Shadow Brokers, a reference to master of the galactic black …

and more »

flame malware – read more

NSA’s Top Hacker Downplays Significance Of Zero-Day Exploits – Immortal News


Immortal News

NSA's Top Hacker Downplays Significance Of Zero-Day Exploits
Immortal News
In an appearance earlier this week at the Usenix Enigma security conference in San Francisco, the National Security Agency's top hacker, Rob Joyce, downplayed the significance of zero-day exploits while noting that there are “many more vectors” that
Zero-day exploits aren't as important to the NSA as you thinkEngadget
NSA hacker says zero-day exploits are overratedModern Readers
NSA's Hacker-in-Chief: We Don't Need Zero-Days To Get Inside Your NetworkMotherboard
Fortune –The Register –Hot Hardware
all 35 news articles »

“zero day” – read more

Surveillance court extends NSA’s phone records collection

A U.S. surveillance court has extended a controversial telephone records dragnet while the National Security Agency works to wind down the program on orders from Congress.

Congress voted in June to rein in the NSA’s mass collection of U.S. telephone records, but the USA Freedom Act allowed for a six-month transition away from the program. On Monday, the Foreign Intelligence Surveillance Court approved an FBI application to continue the records collection program until December.

To read this article in full or to leave a comment, please click here

Network World Security