Edward Snowden’s ability to extract sensitive data from the NSA, working as a low-level contract consultant, comes as no surprise to the security community.
Security experts say Snowden, a Booz Allen Hamilton network analyst based in Hawaii, had the technical savvy to take full advantage of two major security challenges all organizations face: managing privileged accounts and keeping PCs, databases …More
PRISM data transfers done conservatively
June 10, 2013
SEATTLE – The disclosure of details about how marquee U.S. tech companies co-operated with PRISM, the clandestine national security program to ferret out terrorists, shows how methodically and conservatively the program is being carried out.
Google, Microsoft, Yahoo, Facebook, Apple, AOL and Paltalk erected what the New York Times describes as “locked mailboxes” in which to place data on suspicious persons requested by the government under …More
SEATTLE – Details of Jeremy Hammond’s escapades at his peak as a member of Anonymous, the loose-knit hacking collective, underscore how unpredictable – and profoundly disruptive – a determined ideologue, with computer skills, can be.
The 28-year-old from Chicago plead guilty on Tuesday to the December 2011 hacking of Strategic Forecasting, whose website, Stratfor, supplies subscribers with essays and reports on developing trends in international affairs for a …More
SEATTLE – A multi-national cyberspying onslaught, carried out over three years against companies and agencies in a dozen nations, has been uncovered by Norwegian security vendor Norman Shark and San Diego-based antivirus maker ESET.
Here’s the big twist: the perpetrators appear to operate from India. Norman’s principal security researcher, Snorre Fagerland, lays out the case that an elaborate spying botnet, controlled out of India, is the wellspring …More
keep looking »
SEATTLE – The …More