A coalition of tech groups asked the Congress to roll back changes to Rule 41 that allowed law enforcement to do mass hacking. Congress should block the changes to the rules for the regulation of US law enforcement investigations. The rules allow law enforcement agencies hacking in computers worldwide for its investigation. In April, the […]
Earlier June the Tor Project announced a hardened version of the popular Tor Browser that implements a feature dubbed Selfrando to defeat exploits. Early June the Tor Project announced a hardened version of the popular Tor Browser, the Tor Browser 6.5a1-hardened. “A new hardened Tor Browser release is available. It can be found in the 6.5a1-hardened […]
According to the US GAO the FBI’s Next Generation Identification facial recognition system has access to 411.9M photos of Americans and foreigners alike. When we talk about technology, privacy and security are concepts that are often at odds. Let’s think for example of a facial recognition system, this technology could be used in many contexts […]
The FBI disclosed the data related Business e-mail compromise (BEC) crimes, hackers sought to steal over $3 billion through this illegal practice. Business e-mail compromise – BEC crimes are a serious problem for companies, hackers have sought to steal more than $3.1 billion from businesses exploiting this practice, the Federal Bureau of Investigation recently warned. The […]
The popular Tor developer Jacob Appelbaum left the Core Team of the Tor Project after âsexual mistreatmentâ allegations. Appelbaum is recognized as one of the most active and influential digital advocates and security researchers. He is one of the few reporters to have had a preview of the NSA secret documents leaked by Edward Snowden. The news is […]
New documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails. According to Computer Weekly, new documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails and peers. The revelations have been made public through an […]
Iran orders foreign social media and instant messaging companies to use servers in the country to store all data related to the Iranian citizens. The Iranian Government spends a significant effort for the Internet monitoring and control, its activities often lead to a concrete censorship. Last year the Government of Teheran has blocked Telegram and many other social networking companies due to […]
Analyzing the data included in the Internet Crime Compliant Center – IC3 report 2015 recently issued by the Federal Bureau of Investigation. FBI released the Internet Crime Compliant Center – IC3 report of 2015 last week. During the last calendar year, IC3 received 288,012 complaints and 44 percent of them reported financial loss equal to […]
A Slovenian student who reported configuration errors in the Tetra protocol used by the local Police gets a prison sentence. Ethical hacking could be very risky, this is the experience of a 26-year-old Slovenian student, Dejan Ornig, that had serious problems after the discovery of flaws in the Police Communications Protocol. It is incredible, but authorities […]
Facebook might have violated federal privacy laws by scanning users’ private messages.Users launched a class action against the IT giant. Once again we are discussing privacy issues and IT giants, this time, the attention is on Facebook that has been sued for illegally scanning the private messages of its unaware users. In Northern California, users have launched […]