- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged Microsoft
Data Should Be Covered By Fourth Amendment Says Silicon Valley
From Ars Technica:
A group of prominent tech companies and lawyers has come together in new friend-of-the-court filings submitted to the Supreme Court on Tuesday. The group is arguing in favor of stronger legal protections for data generated by apps and digital devices in an important privacy case pending before the court.
The companies, which include Apple, Google, and Microsoft among many others, argue that the current state of the law, which distinguishes between “content” (which requires a warrant) and “non-content” (which does not) “make[s] little sense in the context of digital technologies.”
Tech Firm Developed Spyware For Foreign Governments
Posted by Brian in News, Threat Watch on 25/Aug/2014 12:40
From The Washington Post:
Merely by playing a YouTube video or visiting a Microsoft Live service page, for instance, an unknown number of computers around the world have been implanted with Trojan horses by government security services that siphon their communications and files. Google, which owns YouTube, and Microsoft are racing to close the vulnerability.
Did the NSA Build a Backdoor into U.S. Crypto?
Posted by Gary in Comms, News, Threat Watch on 24/Sep/2013 13:37
From: Threat Level
… The talk was only nine slides long (.pdf). But those nine slides were potentially dynamite. They laid out a case showing that a new encryption standard, given a stamp of approval by the U.S. government, possessed a glaring weakness that made an algorithm in it susceptible to cracking. But the weakness they described wasn’t just an average vulnerability, it had the kind of properties one would want if one were intentionally inserting a backdoor to make the algorithm susceptible to cracking by design.
Microsoft and Google Sue U.S. Government
Posted by Gary in Law, News, Threat Watch on 30/Aug/2013 15:59
From: IGN
Back in July, Microsoft and Google were among a number of tech giants who signed on to a coalition movement asking the U.S. government for more transparency when it comes to sharing the private online data of citizens. Today, the two companies have decided to move forward with litigation against the government, asking the courts to uphold their right to “speak more freely.”
Everyone Has Been Hacked. Now What?
Posted by Gary in Comms, Threat Watch on 6/May/2012 17:03
From; Threat Level
On Apr. 7, 2011, five days before Microsoft patched a critical zero-day vulnerability in Internet Explorer that had been publicly disclosed three months earlier on a security mailing list, unknown attackers launched a spear-phishing attack against workers at the Oak Ridge National Laboratory in Tennessee. More