Fbi

01.29.16
Zero-day exploits aren't as important to the NSA as you think
01.29.16 in

Zero-day exploits aren't as important to the NSA as you think

The head of the NSA's elite hacking unit explains.

By J. Conditt,   01.29.16
View
01.23.16
FBI Dark Web hacks were a part of a global child porn bust
01.23.16 in

FBI Dark Web hacks were a part of a global child porn bust

Operation Pacifier covered numerous countries and agencies.

By J. Fingas,   01.23.16
View
01.15.16
Ex-con posts gun photo to Facebook, gets another 15 years
01.15.16 in

Ex-con posts gun photo to Facebook, gets another 15 years

Because felons aren't allowed to have guns, that's why.

By A. Tarantola,   01.15.16
View
01.11.16
FBI broadens investigation into Clinton emails
01.11.16

FBI broadens investigation into Clinton emails

Now the FBI wants to know if she violated any public corruption laws.

By N. Lee,   01.11.16
View
01.07.16
US leaders meet with tech CEOs to fight terrorism online
01.07.16 in

US leaders meet with tech CEOs to fight terrorism online

Top brass from the FBI and beyond are meeting with Facebook, Google, Twitter and other top internet firms.

By J. Fingas,   01.07.16
View
01.07.16
FBI hacked the Dark Web to bust 1,500 pedophiles
01.07.16

FBI hacked the Dark Web to bust 1,500 pedophiles

It was the largest known child-pornography site on the Dark Web.

By J. Conditt,   01.07.16
View
12.18.15
CNN: FBI is investigating the Juniper Networks security hole
12.18.15 in

CNN: FBI is investigating the Juniper Networks security hole

Juniper Networks equipment is used by the DoD, FBI and Treasury Department.

By R. Lawler,   12.18.15
View
12.16.15
Hillary Clinton's private server had two 'top secret' emails
12.16.15 in

Hillary Clinton's private server had two 'top secret' emails

Critics are concerned that the messages might have been insecure.

By J. Fingas,   12.16.15
View
12.08.15
FBI: Yes, we exploit unpatched security holes
12.08.15 in

FBI: Yes, we exploit unpatched security holes

An FBI director admits that the bureau uses zero-day exploits to snoop on targets.

By J. Fingas,   12.08.15
View