A ruling in an appeal by four men convicted of material support for terrorism finds that the National Security Agency's metadata collection program not only violated the prevailing law at the time but was also likely unconstitutional.
...moreTotal Articles Found: 9
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2020-09-04 17:20:00
Popularity: 85
Author: Robert Lemos Contributing Writer
A ruling in an appeal by four men convicted of material support for terrorism finds that the National Security Agency's metadata collection program not only violated the prevailing law at the time but was also likely unconstitutional.
...morePublished: 2020-06-01 17:35:00
Popularity: 189
Author: Robert Lemos Contributing Writer
The Sandworm group -- behind disinformation and election-hacking campaigns and responsible for a 2016 power outage in the Ukraine -- is now targeting e-mail servers.
...morePublished: 2020-04-30 16:00:00
Popularity: 94
Author: Robert Lemos Contributing Writer
As more students move to online learning platforms, vulnerability researchers are revealing security flaws in some common software plug-ins.
...morePublished: 2020-02-25 18:30:00
Popularity: 48
Author: Robert Lemos Contributing Writer
Order out of chaos? The saga of Chronicle continues with new security features for the Google Cloud Platform.
...morePublished: 2020-02-26 15:15:00
Popularity: 276
Author: Robert Lemos Contributing Writer
Routers and devices with Broadcom and Cypress Wi-Fi chipsets could be forced to sometimes use encryption keys consisting of all zeroes. Now patched, the issue affected a billion devices, including those from Amazon, Apple, Google, and Samsung.
...morePublished: 2019-12-04 15:45:00
Popularity: 53
Author: Robert Lemos Contributing Writer
Published: 2019-05-23 23:45:00
Popularity: 147
Author: Robert Lemos Contributing Writer
The exploits for local privilege escalation vulnerabilities in Windows could be integrated into malware before Microsoft gets a chance to fix the issues.
...morePublished: 2019-05-14 21:44:00
Popularity: 184
Author: Robert Lemos Contributing Writer
A single flaw allowed attackers - thought to be linked to a government - to target human rights workers and install surveillance software by sending a phone request. The victims did not even have to answer.
...morePublished: 2019-05-07 19:15:00
Popularity: 481
Author: Robert Lemos Contributing Writer
New Symantec research shows how the Buckeye group captured an exploit and backdoor used by the National Security Agency and deployed them on other victims.
...more