Toshiba has unveiled a new hard drive meant for "surveillance." It is designed to be used in servers due to it featuring a large amount of storage and RV sensors for use in RAID enclosures.
A week of Windows 10 news, Apple allegations and Sony's week of hell
Nest Learning Thermostat: The Next Generation, review
Microsoft's low end smartphone strategy needs a reboot
The latest table for Pinball FX2, Venom, reviewed
Hands On: Preview of HP's new $200 laptop
Latest deals in the Steam Holiday Sale 2014
Steam Holiday Sale 2014
At Microsoft's Worldwide Partner Conference today, the company took a firm stance in protecting customer privacy with cloud data and has not provided any agency with a backdoor into its data.
The Obama administration has promised that they will push forward legislation extending the US Privacy Act, which protects Americans from unlawful data collection, to European citizens.
Vodafone is releasing a new report in which it publicly confirms that some governments have direct access to users' calls and data. This happens through secret wires into carriers' data centers.
China is reportedly studying IBM servers and evaluating alternatives from local manufacturers to prevent surveillance of its banks from international agencies, such as United States' NSA.
Google is actively looking to simplify encryption of end to end communication between users of its email service following the recent revelations regarding NSA surveillance and the PRISM project.
A security research group has published preliminary findings of their study of the Windows crash reports which claims that the gathered information can be sufficient to get blueprints of networks.
Eight of the world's largest tech companies have joined forces to call for "government surveillance reform", including an open letter petitioning President Obama and Congress to lead global changes.
Edward Snowden's NSA leaks have been the source of much consternation for companies like Google and Facebook; now, they're working with the White House in an attempt to provide greater transparency.
A report released by Foreign Policy reveals NSA Director Keith Alexander is supposedly a huge fan of Star Trek. One of the NSA war rooms was built to replicate the iconic "Starship Enterprise".
If you use an Android, Apple or even a Blackberry, the chances are the NSA can gain access to your phone. Der Spiegel reports contact lists, SMS messages and even users locations can be tracked.
Speaking at a cybersecurity conference in New York City, NSA Director Keith Alexander outlined plans for reducing the number of system admins - plans he claims to pre-date Snowden's classified leaks.
The man behind the recent leak of information of the NSA's large-scale surveillance program will be taking part in a live question-and-answer session at 11 a.m. Eastern Standard Time.
PIPA co-author Patrick Leahy has apparently rewritten an amendment previously meant to protect email privacy to make warrantless access easier, then disowned the amendment via Twitter.
Google's twice-yearly Transparency Report is out, and this time there isn't much good news to go around: worldwide, government inquiries and takedown requests are spiking at unprecedented levels.
A US District Judge has ordered the FBI to come clean on their efforts to access encrypted information and force manufacturers to build backdoors into their products, following a lawsuit from the EFF.
UK schools have discovered a new level of creepiness by installing cameras (as many as one for every 5 students) in 'private' areas, like toilets. Unsurprisingly, privacy advocates are up in arms.
WikiLeaks has been facing a sustained DDoS attack for over 5 days, with a new patriotic hacker group taking credit, but there could be more to the story (it involves surveillance and the government).
What if every website you loaded, movie you streamed, song you pirated, and email you sent was decrypted and stored for a year by your ISP? Scary? It's exactly what the UK is hoping to do.
The US Navy and DHS have tapped a computer forensics company to develop new methods of hacking gaming consoles and establishing a collection of data from second hand devices to use as a base.
Imagine a heavily guarded supercomputer deep in the desert, keeping tabs on everything that passes through the net, all the while working to break the encryption. Sound like bad Sci-Fi? It's not.
On September 1, 2009, a 19-year-old woman from Saskatoon, Saskatchewan, Canada was the victim of a random shooting. Charlotte Dawn Jolly was shot and killed on the streets of Saskatoon while she was out celebrating...
As reported here last year, in its efforts to stop terrorism and the crimes of fraudsters and paedophiles, the UK government had been floating the idea of devising a central database to contain records of...
In a report released by Privacy International, a human rights group formed in 1990 as a watchdog on surveillance and privacy invasions by governments and corporations, the United States has dropped from an "extensive surveillance...
Indonesia plans to tackle Internet crime by tightening the supervision of web surfers. "The aim is to minimise the misuse of the Internet, including for criminal activities," said Gatot Dewa Broto, a spokesman for the...
A computer system being produced by the FBI to read e-mails and other online communications has been dropped. Feds are instead turning to commercial software to eavesdrop on traffic during investigations into suspected criminals, terrorists...
Efforts to set common European Union rules on data collection by telecommunications companies and ISPs (Internet Service Providers) are intensifying, reigniting debate about civil liberties and causing some industry and political officials to question how...
The United Kingdom's Regulation of Investigatory Powers Act (RIPA), which gives U.K. law enforcement agencies access to consumers' mobile phone and Internet data, may be illegal, according to UK information commissioner Elizabeth France. ...