AT&T has been data-mining and willingly sharing user phone data, through its āHemisphereā Project, which is essentially a mass surveillance program. The NSA may be the well-known governmental entity notorious for conducting spy surveillance of its citizens and its massive record retention program, but the private sector is also capitalizing on such opportunities.Ā AT&T, a […]
According to documents analyzed by The Bristol Cable media Agency, the UK authorities have purchased IMSI-catcher equipment. Privacy advocates and rights groups are in revolt against the UK law enforcement thatĀ has purchased mobile phone snooping technology. The rights groups are protesting against the adoption of theĀ IMSI-catcherĀ technology that could be used forĀ dragnet surveillance. The IMSI-catcher is […]
Tor Project and Mozilla are working together to improve the security of Tor users and make harder for attackers to unmask them. IntelligenceĀ andĀ law enforcementĀ agencies continue to invest in order to de-anonymize Tor users. In the past, we received news about several techniques devised by various agencies to track Tor users, from theĀ correlation attacksĀ to the hack […]
Why Signal is considered the most secure instant messaging app? It stores only a few information about its users, and the events demonstrate it. Despite many of the most popular apps are implementingĀ end-to-end encryption, not all applications are equal. Security experts recommend Signal for secure communications, in the aftermath of the DNC hack the staffers […]
Mozilla is at the point of banning Chinese certificate authority WoSign due to a number of severe violations that could impact Internet users. Mozilla is at the point of banning Chinese certificate authority WoSign due to a number of violations, including backdating SHA -1 certificates in order to subvert deprecating certs from being trusted. According […]
Every time you type a number to start an iMessage conversation on your iPhone, Apple logs your message contacts and other metadata. In January 2015, experts claimed thatĀ Apple is not able to read messages sent between devices through iMessages, but reported that the company but it is still able to access data in the backups. […]
Mozilla plans to fix the cross-platform RCE flaw that threatened Tor anonymity. The flaw affects certificate pinning protections implemented by Mozilla. Mozilla plans to release a Firefox update to address theĀ cross-platform remote code-execution vulnerability recently patched in theĀ Tor browser. The tor is inviting its users to install the security update urgently, and Mozilla follows close […]
Surveillance is a profitable business, Motherboard has published a never-before-seen 10-minute video showing a live demo of a surveillance software. Recently, the iPhone hack carried out with theĀ NSO Group‘sĀ PegasusĀ raised the debate about the use of surveillance software. Who uses them? How? Are we able to defend our machines from a so invasiveĀ surveillance? NSO Group is […]
From January 2017, Chrome will indicate connection security with an icon in the address bar labeling HTTP connections to sites as non-secure. Google continues its effort to make the web a better place by pushing the adoption of encryption, we left the IT giant in May whenĀ it announced the decision to switch on default HTTPS […]
The Network of NewSat satellite firm was the ‘most corrupted’ of ever, it was hacked by foreign hackers and it had interception kit in its data centre. The story demonstrates the high interest of spy agencies in hacking communication systems. Once upon a time, the Australian satellite company was deeply hacked by cyber spies that […]