Jump to content

Search the Community

Showing results for tags 'nsa'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station


  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

  1. NSA advises companies to avoid third party DNS resolvers The US National Security Agency (NSA) says that companies should avoid using third party DNS resolvers to block threat actors' DNS traffic eavesdropping and manipulation attempts and to block access to internal network information. NSA's recommendation was made in a new advisory on the benefits (and risks) of using DNS over HTTPS (DoH) in enterprise environments, an encrypted domain name system (DNS) protocol that blocks unauthorized access to the DNS traffic between clients and DNS resolvers. "N
  2. NSA Publishes Cybersecurity Year in Review Report The United States National Security Agency (NSA) has released its 2020 Cybersecurity Year in Review report, which summarizes the NSA Cybersecurity Directorate's first full year of operation. The Cybersecurity Directorate was formally announced in July 2019, with a focus on protecting national security networks and the defense industrial base. Led by Ms. Anne Neuberger, Director of Cybersecurity, the Directorate was also aiming to improve cybersecurity efforts through partnerships. The Cybersecurity Dir
  3. NSA Urges SysAdmins to Replace Obsolete TLS Protocols The NSA released new guidance providing system administrators with the tools to update outdated TLS protocols. The National Security Agency (NSA) is lighting a fire under system administrators who are dragging their feet to replace insecure and outdated Transport Layer Security (TLS) protocol instances. The agency this week released new guidance and tools to equip companies to update from obsolete older versions of TLS (TLS 1.0 and TLS 1.1) to newer versions of the protocol (TLS 1.2 or TLS 1.3).
  4. Senator Wyden puts surveillance nerve-center on blast It's said the NSA drew up a report on what it learned after a foreign government exploited a weak encryption scheme, championed by the US spying agency, in Juniper firewall software. However, curiously enough, the NSA has been unable to find a copy of that report. On Wednesday, Reuters reporter Joseph Menn published an account of US Senator Ron Wyden's efforts to determine whether the NSA is still in the business of placing backdoors in US technology products. Wyden (D-OR) opposes such e
  5. The U.S. National Security Agency (NSA) is warning that Chinese state-sponsored hackers exploit 25 different vulnerabilities in attacks against United States organizations and interests. In an advisory issued today, the NSA is aware of targeted attacks by Chinese state-sponsored hackers against National Security Systems (NSS), the U.S. Defense Industrial Base (DIB), and the Department of Defense (DoD) information networks. As part of these attacks, the NSA has seen twenty-five publicly disclosed vulnerabilities exploited to gain access to networks, deploy m
  6. NEW YORK — Where were you when you first heard about the Snowden leak? The huge breach of the National Security Agency’s domestic surveillance program in June 2013 was one of the proudest moments in modern journalism, and one of the purest: A brave and disgusted whistleblower, Edward Snowden, revealed the government’s extensive surveillance of American and foreign citizens. Two journalists protected their source, revealed his secrets and won the blessings of the Establishment — a Pulitzer Prize and an Oscar for it.
  7. Beware of find-my-phone, Wi-Fi, and Bluetooth, NSA tells mobile users And don't forget to limit ad tracking. Advisory contains a host of recommendations. Enlarge Christine Wang / Flickr 81 with 61 posters participating The National Security Agency is recommending that some government workers and people generally concerned about privacy turn off find-my-phone, Wi-Fi, and Bluetooth whenever those services are not needed, as well as limit location data usage by apps. “Location data can be ext
  8. from the ALL-WHISTLES-MUST-BE-BLOWN-INSIDE-THE-HOUSE----The-management dept The NSA is promising to be kinder to whistleblowers. This is important, at least to the NSA, because its most famous whistleblowers have eventually gone outside the system to deliver news of systemic surveillance program abuse to the masses. I don't think NSA officials necessarily want to handle internal complaints and scale back abusive collection programs. I think they just want to make sure no one outside of the NSA and its direct oversi
  9. The Chinese are making doubly sure public displays of displeasure with their totalitarian regime such as occurred in Tiananmen Square in 1989 will never be repeated. They are instituting a technological surveillance program so pervasive that when completed -- quite soon, it seems -- it will enforce conformity throughout their giant country on a scale that would stupefy Orwell and Huxley. China’s plan to judge each of its 1.3 billion people based on their social behavior is moving a step closer to reality, with Beijing set to adopt a lifelong points program by 2021 tha
  10. The NSA surveillance whistleblower issued a scathing review of tech in his upcoming interview with Recode’s Kara Swisher. Former CIA employee and whistleblower Edward Snowden talked to Kara Swisher in an upcoming edition of the Recode Decode podcast. American whistleblower Edward Snowden is living a life of exile in Russia because he shared thousands of top-secret government documents with journalists. But six years after he exposed how the US government surveils the digital lives of everyday Americans, Snowden is not just worried about the powers
  11. Intelligence agencies stopped the practice last year American intelligence agencies quietly stopped the warrantless collection of US phone location data last year, according to a letter from the Office of the Director of National Intelligence released today. Last year, in a landmark decision, the Supreme Court ruled against authorities looking to search through electronic location data without a warrant. Citing the ruling, Sen. Ron Wyden (D-OR), a privacy hawk in Congress, wrote a letter to then-Director of National Intelligence Dan Coats asking how
  12. A National Security Agency (NSA) surveillance program that accessed American citizens’ domestic phone calls and text messages resulted in only one investigation between 2015 and 2019 despite costing $100 million, a newly declassified study found. The report, which was produced by the Privacy and Civil Liberties Oversight Board and briefed to Congress on Tuesday, also found that the program only yielded information the FBI did not already have on two occasions during that four-year period. “Based on one r
  13. The National Security Agency (NSA) improperly collected records on American phone calls and texts last year, according to new documents obtained and released by the American Civil Liberties Union (ACLU). The error occurred between Oct. 3 and Oct. 12, the documents show, and had not been previously disclosed. The documents were obtained by the ACLU through a Freedom of Information Act request. The incident occurred four months after the NSA said it had deleted scores U.S. records that were collected since 2015 due to a separate error. The records contained details
  14. Python Programming Language: Now you can take NSA's free course for Beginners NSA releases Python course after receiving a Freedom of information Act (FOIA) request for its training materials. Developers already have numerous options from the likes of Microsoft and Google for learning how to code in the popular Python programming language. But now budding Python developers can read up on the National Security Agency's own Python training materials. Software engineer Chris Swenson filed a Freedom of information Act (FOIA) request with the NSA for access to its Pytho
  15. Inside the NSA’s Secret Tool for Mapping Your Social Network Edward Snowden revealed the agency’s phone-record tracking program. But thanks to “precomputed contact chaining,” that database was much more powerful than anyone knew. Illustration: Elena Lacey; Baikal/Alamy In the summer of 2013, I spent my days sifting through the most extensive archive of top-secret files that had ever reached the hands of an American journalist. In a spectacular act of transgre
  16. Momentum is growing in Congress to reject the Trump administration’s request to reauthorize a controversial surveillance program. Lawmakers have until March 15 to reauthorize expiring provisions under the USA Freedom Act, including a controversial phone records program known as Section 215. The program, initially made public through leaks by former government contractor Edward Snowden, allows the National Security Agency (NSA) to collect metadata on incoming and outgoing calls from a specific number, though it does not allow the NSA to look at the content of the calls.
  17. Internet paranoiacs drawn to bitcoin have long indulged fantasies of American spies subverting the booming, controversial digital currency. Increasingly popular among get-rich-quick speculators, bitcoin started out as a high-minded project to make financial transactions public and mathematically verifiable — while also offering discretion. Governments, with a vested interest in controlling how money moves, would, some of bitcoin’s fierce advocates believed, naturally try and thwart the coming techno-libertarian financial order. It turns out the conspiracy theorists were
  18. A new generation of crypto-jacking attacks is making the rounds, significantly improving on the unsophisticated campaigns that have characterized such attacks so far. According to Imperva, the campaigns, one of which the firm dubbed RedisWannaMine, is aimed at both database servers and application servers. And where the first generation of crypto-jacking was limited in complexity and capability (the attacks contained malicious code that downloaded a crypto-miner executable file and ran it with a basic evasion technique or none at all), the new wave of threats are something else altogether
  19. Your PC might be making some criminal sweet, sweet cash, according to the findings of a cybersecurity firm. You might remember the chaos caused by the WannaCry cybersecurity crisis last year, where a security exploit developed by the National Security Agency in the US was used to create a devestating ransomware attack on an international scale that affected over 230,000 computers in over 150 countries. Well, out of the fire of that nightmare has come a new exploit called WannaMine, with a completely different goal in mind; to covertly use infected computers and networks
  20. POSTER NOTE: This is important because it ties in the military combat capabilities (special ops) with the NSA. Gen. Paul Nakasone assumed the directorship of the National Security Agency and Cyber Command, now officially a unified combatant command, from Adm. Michael Rogers in a ceremony May 4. In doing so, Nakasone became “the primary guardian of our nation’s cyber domain, said Patrick Shanahan, deputy secretary of defense.
  21. The agency collected a staggering 534 million domestic phone records last year, up threefold on the year earlier. New figures reveal a sharp increase in the number of searches of Americans' calls and messages by the intelligence community during the Trump administration's first year in office. The figures, published Friday by the Office of the Director of National Intelligence (ODNI), show a rise in targeted surveillance and searches of people's data. It's the latest annual report from the government's chief spy, which has faced calls to be more transparent in the wake
  22. Supreme Court nominee discussed notable surveillance cases during Friday testimony. On Friday, during the final day of hearings before the Senate Judiciary Committee, Sen. Patrick Leahy (D-Vt.) had an interesting exchange over recent privacy cases with the Supreme Court judicial nominee, Judge Brett Kavanaugh. "I've talked repeatedly in this hearing about how technology will be one of the huge issues with the Fourth Amendment going forward," said Kavanaugh, who serves on the United States Court of Appeals for the District of Columbia Circuit. Ope
  23. from the violating-the-law-on-the-regular dept More evidence of the NSA's abuse of its surveillance powers has surfaced, thanks to a FOIA lawsuit by the EFF. To date, the EFF has secured 73 FISC opinions as the result of this lawsuit and is still fighting for the release of six opinions the government has chosen to withhold entirely. One of the opinions released to the EFF shows the NSA's frequent assertions about proper minimization, careful deployment of surveillance techniques, and supposedly robust oversight are mostly false. The NSA abuses its powers an
  24. Here are eight AT&T-owned locations, buildings that are reportedly central to the NSA's internet spying purposes. Have you ever wondered what locations on American soil serve as backbone or “peering” facilities that the NSA might secretly be using for eavesdropping purposes? The Intercept revealed eight such AT&T-owned locations: two in California, one in Washington, another in Washington, D.C., one in New York, one in Texas, one in Illinois, and one in Georgia. You might pass by these AT&T buildings having no idea t
  • Create New...