Kevin Mandia, who uncovered Chinese hacking, describes how he stumbled onto one of the largest domestic security breaches ever.
FORTUNE -- When 42-year-old Kevin Mandia went public last February with a 60-page report detailing the Chinese theft of American trade secrets, the move propelled his cybersecurity firm Mandiant to the forefront of a national security fire storm.
The story of how Mandia discovered one of America's largest security breaches ever -- and MOREJP Mangalindan, Writer - Jul 24, 2013 7:34 PM ET
In the space of six months Apple received 4,000 to 5,000 law enforcement requests.
FORTUNE -- Embarrassed to find itself on the list of companies from whose servers the National Security Agency claims to have been "directly" collecting data, Apple (AAPL) issued a public statement early Monday that it hoped would allay its customers' concerns. Among the key points:
The authorities asked for a ton of information: Between Dec. 1, 2012 and May MOREPhilip Elmer-DeWitt - Jun 17, 2013 7:21 AM ET
Companies like Silent Circle, which promises to secure or get rid of consumers' private information, have seen a surge in the wake of government spying reports.
FORTUNE -- Silent Circle, an app that allows users to place encrypted phone calls, makes money on paranoia. Paranoia like, say, the fear that the government might build a massive surveillance operation in cooperation with major tech companies and then keep it secret from the MOREJun 14, 2013 10:24 AM ET
What's next for the companies involved in the NSA leaks scandal.
By Ryan Bradley, senior editor
FORTUNE -- On Sunday, a 29-year-old Booz Allen Hamilton employee named Edward Snowden stepped forward and (via the Guardian) told the world why he chose to make public top-secret National Security Agency documents. The NSA files, particularly those concerning a program called PRISM, describe how the agency could access data from several of America's largest MOREJun 10, 2013 9:23 AM ET
Apple, Google, Yahoo and Microsoft have denied participating in the controversial government program. When will one of their employees say otherwise?
By Ryan Bradley, senior editor
FORTUNE -- Thursday night, after the Guardian broke news of Verizon's involvement in a massive domestic spying operation by the National Security Agency, the Washington Post and the Guardian both revealed the existence of a program called PRISM -- a means by which the government gained access MOREJun 7, 2013 11:51 AM ET
A company called Placed is applying some of the methods used online to the real world.
FORTUNE -- Foot traffic at bookstores rose by 27% in the first quarter of this year, according to a report issued this week by Placed, a Seattle-based company that aims to bring Internet-like marketing analytics to the offline world.
That seems like a surprising number. It's hard to know for sure how accurate it is, or MOREDan Mitchell, contributor - May 24, 2013 12:07 PM ET
Hearings on the CISPA cybersecurity measure may be held as soon as next week - behind closed doors.
FORTUNE -- The House Intelligence Committee, possibly as early as next week, will discuss the Cyber Intelligence Sharing and Protection Act (CISPA) for the second time. And for the second time, it will do so behind closed doors.
The bill is designed to make it easier for private companies to share the personal information of MOREDan Mitchell, contributor - Apr 5, 2013 2:10 PM ET
Companies and lobbyists that support CISPA, a proposed cyber-security law that critics call intrusive, outspent opponents by a factor of 13 in House campaign contributions. Nevertheless, CISPA is losing traction.
FORTUNE -- Despite hardball lobbying and vast piles of money shoved toward members of Congress, it's proving to be extremely difficult to pass legislation that is opposed by advocates of privacy and Internet freedom. This was proved last year with the MOREDan Mitchell, contributor - Mar 22, 2013 2:30 PM ET
Microsoft's ads make Google's email scanning sound sinister, but its own scanning - to block spam - isn't much different.
FORTUNE -- Microsoft's anti-Google "Scroogled" campaign is based largely on the contention that rival Google "goes through" private email in order to target ads at users based on keywords. And that's technically true. It's also technically true that Microsoft, too, "goes through" private email, though its intent is different: Microsoft's Outlook.com MOREDan Mitchell, contributor - Mar 5, 2013 4:03 PM ET
'Do Not Track' sounds a lot like 'Do Not Call.' But unlike telemarketing, online ad-tracking takes place unobtrusively, behind the scenes.
FORTUNE -- Legislation to give Internet users the right to prevent advertisers from tracking their online activities was re-introduced in the Senate on Thursday. It has little chance of passing.
The proposed Do Not Track Online Act sounds a lot like the very popular federal Do Not Call legislation that was MOREDan Mitchell, contributor - Mar 4, 2013 6:45 AM ET
|The medical marijuana ad that never aired, despite contrary media headlines|
|2 million students missing out on college aid|
|GM raising Corvette prices|
|China to fight pollution with drones|
|Boeing reports wing cracks on Dreamliners|