Government of Russia has refused iPad in favor superseding tablets Samsung, said the head of the Ministry of communications of Russia Nikolay Nikiforov.
"It is protected in a special way devices that can be used for handling of confidential information.
Some information in the government sessions are confidential, and these devices (Samsung) fully meet these requirements and have passed the most stringent certification system" - quoted Mr. Nikiforov Agency ITAR-TASS. The Official reason "replacement" called a purely technical nature, that is, supposedly, the policy is not satisfied exclusively by the technical capabilities of equipmentRead more
Facebook, Microsoft, Yahoo and Google on Monday began publishing details about the number of secret government requests for data they receive, hoping to show limited involvement in controversial U.S. surveillance efforts.
The tech industry has pushed for greater transparency on government data requests, seeking to shake off concerns about their involvement in vast, surreptitious surveillance programs revealed last summer by former spy contractor Edward Snowden. The government said last month it would relax rules restricting what details companies can disclose about Foreign Intelligence Surveillance Act (FISA) court orders they receive for user information.Read more
The NSA can plant malicious software on Apple's iPhone, turning one of the world's most popular smartphones into a pocket-sized spy, according to a leading security expert.
Privacy advocate Jacob Appelbaum gave the public an unusually explicit peek into the intelligence world's toolbox at a hacking conference in Germany, pulling back the curtain on the US National Security Agency's (NSA) arsenal of high-tech spy gear.
The independent journalist and security expert said on Monday that the NSA could turn iPhones into eavesdropping tools and use radar wave devices to harvest electronic information from computers, even if they weren't online.Read more
Google is developing an anonymous identifier for advertising, or AdID, that would replace third-party cookies as the way advertisers track people's Internet browsing activity for marketing purposes.
Google, the world's largest Internet search company, is considering a major change in how online browsing activity is tracked, a move that could shake up the $120 billion digital advertising industry. Google, which accounts for about a third of worldwide online ad revenue, is developing an anonymous identifier for advertising, or AdID, that would replace third-party cookies as the way advertisers track people's Internet browsing activity for marketing purposes, according to a person familiar with the plan.Read more
The US intelligence agency NSA has been taking advantage of the smartphone boom. It has developed the ability to hack into iPhones, android devices and even the BlackBerry, previously believed to be particularly secure.
Michael Hayden has an interesting story to tell about the iPhone. He and his wife were in an Apple store in Virginia, Hayden, the former head of the NSA, said at a conference in Washington recently. A salesman approached and raved about the iPhone, saying that there were already "400,000 apps" for the device. Hayden, amused, turned to his wife and quietly asked: "This kid doesn't know who I am, does he? Four-hundred-thousand apps means 400,000 possibilities for attacks."Read more
Apple has patented a piece of technology which would allow government and police to block transmission of information, including video and photographs, from any public gathering or venue they deem “sensitive”, and “protected from externalities.”
In other words, these powers will have control over what can and cannot be documented on wireless devices during any public event. And while the company says the affected sites are to be mostly cinemas, theaters, concert grounds and similar locations, Apple Inc. also says “covert police or government operations may require complete ‘blackout’ conditions.”Read more
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.
The program, code-named PRISM, has not been made public until now. It may be the first of its kind.
The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers.Read more