Security News


Why does the NSA's boss care so much about backdoors when he can just steal all our encryption keys?
http://www.theregister.co.uk/2015/02/25/nsa_boss_encryption_backdoors/ By Iain Thomson The Register 25 Feb 2015



http://arstechnica.com/information-technology/2015/02/how-hackers-could-attack-hard-drives-to-create-a-pervasive-backdoor/ By Sean Gallagher Ars Technica Feb 18, 2015

http://arstechnica.com/security/2015/02/psa-your-crypto-apps-are-useless-unless-you-check-them-for-backdoors/ By Dan Goodin Ars Technica Feb 4, 2015

http://www.computerworld.com/article/2872694/oracle-to-fix-167-vulnerabilities-including-a-backdoor-like-flaw-in-its-e-business-suite.html By Lucian Constantin IDG News Service Jan 20, 2015

http://arstechnica.com/security/2015/01/worlds-first-known-bootkit-for-os-x-can-permanently-backdoor-macs/ By Dan Goodin Ars Technica Jan 7, 2015

http://arstechnica.com/security/2014/11/highly-advanced-backdoor-trojan-cased-high-profile-targets-for-years/ By Dan Goodin Ars Technica Nov 23 2014

http://www.wired.com/threatlevel/2013/09/nsa-backdoor/ By Kim Zetter Threat Level Wired.com 09.24.13