Search for: "A. E. L. C. "
Results 3021 - 3040
of 10,346
Sorted by Relevance
|
Sort by Date
6 Sep 2013, 12:45 pm
Its fully fleshed-out website is an empty husk, with phone numbers and e-mail addresses that do nothing. [read post]
11 Nov 2013, 10:07 am
Armed with a user e-mail and corresponding Adobe password, they're free to try the combination to hijack accounts on other sites and then use them in spam and phishing campaigns, along with other fraudulent schemes. [read post]
18 Dec 2013, 6:00 pm
Wikimedia One doesn't have to wade deeply into the murky waters of surveillance policy to find people who have no problem with broad-based spying on foreigners' phone calls and e-mails. [read post]
7 Jul 2013, 6:00 pm
Brazilian newspaper O Globo and UK paper The Guardian published articles on Saturday alleging that the NSA was collecting and storing the e-mail and telephone records of millions of Brazilians through a program called FAIRVIEW. [read post]
28 Jan 2014, 8:25 am
Unlike Foreign Intelligence Surveillance Act (FISA) warrants, NSLs can only request metadata such as phone numbers dialed or e-mail addresses communicated with. [read post]
23 Aug 2013, 11:25 am
Rather than use the same key to encrypt multiple messages—the way, say PGP- and S/MIME-protected e-mail programs do—applications that offer perfect forward secrecy generate ephemeral keys on the fly. [read post]
15 Nov 2013, 10:14 am
Hammond pleaded guilty in May to hacking the servers of the private intelligence firm Strategic Forecasting in December 2011, where he lifted millions of e-mails and thousands of credit card numbers and destroyed the firm’s data in the process. [read post]
14 Jul 2013, 10:00 am
Legal drama is nothing new for Apple—Samsung, e-books, App Store trademarks, etc. [read post]
2 Oct 2013, 2:49 pm
Short for operations security, it encompasses a sprawling list of disciplines, including keeping PCs free of malware, encrypting e-mail and other communications, and placing an impenetrable firewall between public and personal identities. [read post]
27 Oct 2013, 2:00 pm
I encrypt my e-mail when possible, I’ve moved away from Gmail, and I’ve become much more vigilant about using a VPN nearly all the time. [read post]
3 Jul 2013, 11:00 am
A nearly identical case was filed against Amazon two months ago (PDF), seeking bans on the Kindle Paperwhite e-reader and the entry-level Kindle Fire tablet. [read post]
13 Feb 2014, 7:10 am
Don't even think of scanning that document directly to e-mail. [read post]
22 Dec 2013, 6:10 pm
FTC lawyer David Frankel, who was overseeing Wallace courthouse questioning as part of a separate spam case brought by the government, had resorted to telephone calls, FedEx packages, and e-mails to contact Wallace; he even sent a personal messenger on occasion. [read post]
5 Sep 2013, 4:50 pm
Snowden's put forward, all the stories that have been written, what you're not reading about is the government actually abusing these programs and, you know, listening in on people's phone calls or inappropriately reading people's e-mails. [read post]
8 Aug 2013, 12:58 pm
And with the ability for each one to share the Internet traffic it collects with every other node, the system can assemble a detailed dossier of personal data, including the schedules, e-mail addresses, personal photos, and current or past whereabouts of the person or people it monitors. [read post]
20 Dec 2013, 1:45 pm
Kevin Igoe, who in a 2011 e-mail announcing his appointment was listed as a senior cryptographer with the NSA's Commercial Solutions Center, is one of two co-chairs of the IETF's Crypto Forum Research Group (CFRG). [read post]
18 Nov 2013, 1:47 pm
The arrests came after the defendants sent $800,000 in cash proceeds in a suitcase transported by bus to a syndicate kingpin located in Florida, US Attorney for the Eastern District of New York Loretta E. [read post]
22 Dec 2013, 4:10 pm
As the New York Times notes, these filings mark the first time the government acknowledged that the NSA "started systematically collecting data about Americans’ e-mails and phone calls in 2001, alongside its program of wiretapping certain calls without warrants." [read post]
18 Nov 2013, 11:10 am
Moreover, if a developer only collects UDIDs and e-mail addresses initially, a plagiarized application can be extended to place home-screen icons, spam the notification bar, and so on to maximize the hijacker’s revenue." [read post]
12 Dec 2013, 5:18 pm
The widespread takeaway from today's announcement that Google will start caching all remotely-hosted images sent to Gmail users was that the move will hinder e-mail marketers and other nosy senders by preventing them from seeing recipients' personal information. [read post]