If true, the news will likely please many folks in Silicon Valley. Photo: ABC
Good news everyone: The NSA no longer wants to collect your phone calls and text messages. Apparently.
Despite once being all-in on its electronic spying program, the National Security Agency now supposedly wants to abandon its mass data collection practices.
If there are Chinese spy chips concealed on Apple data servers, the NSA can't find them. Photo: JÉSHOOTS/Pexels
The tech world has been rocked by allegations that companies, including Apple and Amazon, were sold data servers compromised by Chinese spies. However, a senior cyber security advisor to the National Security Agency says that no one he knows of has found any sign of this.
Apple's on a mission to keep iPhone 8 parts like these from leaking. Photo: Reddit
Tim Cook’s mission to double down on secrecy at Apple is producing results that even Steve Jobs would be envious of, based on a new report that details the extreme lengths Apple has gone through to stop leaks.
Ironically, a recording of Apple’s security team discussing leaks has been leaked online, giving all-new details on how Apple prevents employees and factory workers from leaking information and parts to the public.
Wikileaks' "Vault 7" data dump allegedly reveals CIA hacking tools used to compromise iPhones, Android phones and other devices. Image: Gordon Johnson/Pixabay
The Central Intelligence Agency has been using malware to spy on iPhone and Android users, according to the largest-ever publication of confidential documents from WikiLeaks — and the spy tools are now in the hands of others.
As part of a covert hacking program, the CIA created a “malware arsenal” and dozens of “zero day exploits” to infiltrate smartphones, tablets and even smart TVs to extract data and turn them into covert microphones.
But the agency recently lost controls of these tools. Those who have obtained them now have “the entire hacking capacity of the CIA” at their disposal, according to WikiLeaks.
You might want to put tape over your webcam. Photo: Ste Smith/Cult of Mac
Security researchers discovered a new way to hack the Mac’s built-in webcam this week, and the method is undetectable by users.
Apple built a green LED light into every Mac with firmware-level protection that turns on anytime the sensor is tripped by unauthorized access. The security feature has become increasingly difficult for hackers to beat, but former NSA staffer Patrick Wardle found a way to piggyback on outgoing feeds and record them.
The first Snowden trailer reveals how he leaked the NSA's secrets. Photo: Open Road Films
Joseph Gordon-Levitt busts out his best nerd voice in the first trailer for Oliver Stone’s new film, Snowden.
The film is based on the true story of how Edward Snowden went from enlisting in army reserve, to exposing the illegal surveillance activities conducted by the NSA and thus becoming the most wanted man in the world.
The deadline for Zerodium’s iOS 9 bug bounty officially ended last month, and the company announced today that one team managed to claim the million-dollar prize by providing an improbable hack that allows attackers to remotely jailbreak the newest iPhone operating system.
The U.S. Senate is hashing out the USA Freedom Act, which concerns government wiretapping. Screencap: Evan Killham/Cult of Mac
The U.S. Senate has taken one step closer to a final vote on changing the government’s controversial program to freely tap and monitor citizens’ phones.
Senators voted 83-14 to end debate on the “Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection and Online Monitoring” (USA Freedom) Act. The bill will extend lapsed provisions of the anti-terrorism Patriot Act and aims to add transparency to the NSA’s activities surrounding wiretapping and data collection.
A final vote could happen as early as this afternoon.
Apple has taken steps to avoid snooping. File photo: Cult of Mac
Apple has put its name to a letter which will be sent today, appealing to the White House to protect individual privacy rights in the face of suggestions that law enforcement should be able to access encrypted smartphone data via a backdoor.
“Strong encryption is the cornerstone of the modern information economy’s security,” argues the letter, which is signed by more than 140 tech companies, technologists, and civil society groups.