Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal wiretap into the cyber age.
Conspiracy theorists and suspicious security experts have said for years that Microsoft cooperates with the National Security Agency, handing over reams of data to help the NSA decrypt communications.
Megaupload founder Kim Dotcom said Thursday he was "in tears" after a European company deleted all the data it was hosting from his shuttered file-sharing site.
The nation's new billion-dollar epicenter for fighting global cyberthreats sits south of Salt Lake City, tucked away on a National Guard base at the foot of snow-capped mountains.
No matter where the debate about freedom, democracy and the Constitution goes from here, the leaked information concerning the National Security Agency's various secret surveillance programs...
A self-described anarchist and "hacktivist" from Chicago pleaded guilty Tuesday to charges he illegally accessed computer systems of law enforcement agencies and government contractors.
On May 7, the nation’s top spy agency released a guide to “Internet Research,” essentially a how-to book for its agents looking to get the most out of Google, Yahoo and other Web search tools.