Since the first of many leaked documents showed that the NSA has been gathering phone records as part of its anti-terrorism program, there's been an ongoing fight over just what these records reveal.
To supporters, the metadata collection is a limited system that's rarely queried and doesn't contain enough information to be considered an invasive search: the NSA has said it doesn't collect either the content of calls or the names attached to phone numbers.
As many technology and legal experts on the other side say, though, metadata matters, and a Stanford Security Lab project demonstrates that removing names from a database doesn't effectively mean much.Read more
Over 2 million passwords for popular social networking sites such as Facebook and Twitter, as well as Google and Yahoo accounts have been stolen and posted online, with Russian social networks VKontakte and Odnoklassniki also featuring on the hitlist.
Internet security firm Trustwave exposed the extensive data hoard, saying in its blog that the responsible botnet – dubbed Pony – had harvested information from thousands of vulnerable computers on a global scale.
The information included login credentials, email addresses and passwords. In total, 1,580,000 website login credentials were stolen, alongside 320,000 email and 41,000 FTP accounts.Read more
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.
The program, code-named PRISM, has not been made public until now. It may be the first of its kind.
The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers.Read more