UN report promotes encryption as fundamental and protected right
On Wednesday, Special Rapporteur on freedom of opinion and expression David Kaye will present his report on international legal protection for encryption and an…
On Wednesday, Special Rapporteur on freedom of opinion and expression David Kaye will present his report on international legal protection for encryption and an…
"Taken together, those measures could amount to a new backdoor for government surveillance, according to some experts. The revelation earlier this month th…
"Gawker could have told the story and described the video (as it did, in great detail, which you can still read, even though the video has been taken down…
""The Silicon Valley style is to move forward with the cool technology," said Jeffrey Vagle, executive director of the Center for Technology, Inn…
The U.S. government has suffered a hacking attack that has potentially revealed highly sensitive information about millions of government employees. Some commen…
In two years, section 702 of the FISA Amendments Act will expire. It is essential the public to have confidence that any reforms to section 702 will actually ad…
In two years, section 702 of the FISA Amendments Act will expire. It is essential the public to have confidence that any reforms to section 702 will actually ad…
Perceiving whether someone is sad, happy, or angry by the way he turns up his nose or knits his brow comes naturally to humans. Most of us are good at reading f…
""The phone companies may already have data retention obligations under the Communications Act, but there's no additional obligation as a result o…
Read the entire press release here. SAN FRANCISCO, June 4, 2015 /PRNewswire/ -- Today, Black Hat, the world's leading family of information security events…
"The N.S.A.’s activities run “smack into law enforcement land,” said Jonathan Mayer, a cybersecurity scholar at Stanford Law School who has researched priv…
"WELNA: It could indeed. Hackers, by definition, are trying to break into other people's computer accounts and steal their information, so monitoring t…