Register Analysis A leaked NSA cyberarms catalog has shed light on the sorts of technologies US and UK spies use to infiltrate and remotely control PCs, routers, firewalls, phones and software from some of the biggest names in IT. The exploits, often delivered via the … NSA can turn your iPhone into a spy, says privacy advocate Jacob AppelbaumSydney Morning Herald Good or not, change is coming to the NSAWashington Post Report: NSA intercepts computer deliveriesBusinessweek Fox News –Apple Insider –CNN all 444 news articles |
Source: Tech News From Google