U.S. Authorities have charged other three men in huge cyber fraud targeting JPMorgan, and at least another nine financial institutions. The US authorities have charged three individuals over the hack of the JPMorgan Chase and other financial institutions. The data breach suffered by the JPMorgan Chase is considered the largest ever hacking case in financial history, data related nearly 76 million households […]
Documents published by the UK Government reveal that the UK’s National Crime Agency has the hacking capabilities, so called equipment interference. We have debated for a long time about hacking capabilities of principal law enforcement and intelligence agencies. Many documents leaked by the whistleblower Edward Snowden revealed that the UK intelligence agency, the GCHQ has the […]
The CISA cyber security bill passes US Senate despite tech giants, privacy advocates, and civil liberties groups express their disappointment. The US Senate voted overwhelmingly to pass a version of the Cybersecurity Information Sharing Act (CISA), a bill that has been debated for a long because it will authorize government pervasive monitoring of citizens. Many politicians, tech […]
Motherboard has obtained a non-public email sent by the Hacking Team CEO to its customers that announce a new generation of hacking tools. Hacking Team is the popular surveillance company that suffered a serious data breach this year. More than 400 GB of its sensitive data were exfiltrated from the Italian company, including internal emails, zero-day exploits, surveillance […]
A few days after the arrest of 15-year-old in Northern Ireland, the British Police arrested a second in connection with the TalkTalk breach. There is a second arrest for the TalkTalk hack, the UK Police have arrested a second individual as part of the investigation into the recent data breach suffered by the company. Also in […]
The Copyright Office has granted DMCA exemptions for jailbreaking making the procedure legal in the United States in the next years. Jailbreaking an iOS mobile device it is possible to remove hardware restrictions implemented by the Apple’s operating system, Jailbreaking gives users root access to the iOS file system and manager, this allows them to download and […]
Apple told a federal judge that it “would be impossible” to access data on a locked iPhone running one of the newer versions of the iOS operating system. Unlock this iPhone, I need access it for the investigation. It is probably one of the most common requests US law enforcement makes to Apple, but it […]
#OpNimr – Anonymous targets Saudi websites to protest against a death sentence of crucifixion to a 17-years old for alleged anti government activities. The popular collective Anonymous has launched the #OpNimr campaign against the Government of Saudi Arabia to protest against it continuous violation of human rights. Anonymous targets Saudi websites is in response to the death sentence handed […]
How does this privacy apply to cybersecurity? The rule of the cyberlaw in the protection of cyber vendor services against the risk of litigation exposure. In most countries and most legal systems, the sanctity of the attorney client relationship is guarded by the courts. Without confidentiality and privacy, the system of law can break down […]
The Indian Government plans to release the new National Encryption Policy, a law that seems to be one of the big threat to the Internet freedom. A new problem is worrying the Indian friends, the Government plans to release a new policy, National Encryption Policy’ that seems to presage disappointments for users. Among ugly and questionable issues […]