Laws and regulations

Pierluigi Paganini June 21, 2015
Electronic Frontier Foundation – WhatsApp ranked as the worst at protecting users’ privacy

The Electronic Frontier Foundation published the “Who Has Your Back? 2015” report that ranked WhatsApp ranked as the worst in protecting users’ privacy. The Electronic Frontier Foundation has published its annual report “Who Has Your Back? 2015: Protecting Your Data From Government Requests” that analyzes how private companies handlesusers data with specific focus on Government surveillance. “Which […]

Pierluigi Paganini June 20, 2015
NIST is seeking more advanced tattoo forensic analysis

NIST is seeking more advanced tattoo forensic analysis, matching the tattoos into a computer system could help law enforcement to catch more offenders. One in five American adults has at least one tattoo and this number is much higher among the criminal population. Law enforcement has used tattoos as a means of criminals and victim […]

Pierluigi Paganini June 10, 2015
Belgian authorities detained terrorists by intercepting WhatsApp messages

Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group. According to a report published by Bloomberg, two men were arrested and warrants were issued for other three suspects that were allegedly preparing a terrorist attack in Belgium. The interesting part of the news is that law […]

Pierluigi Paganini June 06, 2015
A report shows that the NSA is in a search for hackers

The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, what does it means for Americans? The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, where the NSA is able to spy internet traffic in search […]

Pierluigi Paganini June 05, 2015
European cloud trends: Law reforms on cloud data protection is vital for the European Commission

Law reforms on cloud data protection is vital for the European Commission (EC). The role of EC and EU has a compromise to perform legal priorities in cyberspace and develop markets Breaking down barriers is the dilemma for investors, companies, EU member states and lawmakers to guarantee an atmosphere of legitimacy on new European cloud […]

Pierluigi Paganini June 04, 2015
The FBI is not able to monitor ISIS’s encrypted communications

The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS, it urges a law to give them more powers. The FBI warned lawmakers there was no way to monitor encrypted online communications exploited by Islamic State militants and sympathizers. The law enforcement urges IT giants to provide […]

Pierluigi Paganini June 02, 2015
Cyber-politics to debate on surveillance versus privacy

The Data “crown jewels” on global Cyber Risk: New scenarios of Cyber-politics to debate on surveillance versus privacy After two-year, stop-and-go legislative effort on the controversy of section 215 of the Patriot Act, the American Senate voted in plenary 77-to-17 on Sunday-night to move a House bill forward to object political conflict on surveillance vs. […]

Pierluigi Paganini May 31, 2015
Popular Kim Dotcom’s domains, seized by the FBI, now in the hands of crooks

Two of the most popular domains of ever, that were seized by the FBI from Kim Dotcom three years ago, are now used for illegal activities. Former FBI web domains were used by crooks to serve porn or spread adware. Some of the sites that were abused by cyber criminals belong to a lot of domains that […]

Pierluigi Paganini May 29, 2015
MI5 to Google and Whatsapp, hand me your messages

The Conservatives are planning new laws to give MI5 the power to force IT giants to hand over encrypted messages from terror suspects. Potential global terrorism threats are persuading to Conservatives in UK to move the pieces of chess by law; in advance of the world’s biggest internet companies, such as Google, Apple and Facebook […]

Pierluigi Paganini May 21, 2015
IRRITANT HORN – NSA plan to Hijack Google Play Store to serve spyware

A new top-secret document leaked by Snowden revealed how the NSA and its allies planned to target Android platforms under the project IRRITANT HORN. New top-secret documents leaked by the whistleblower Edward Snowden revealed that the NSA and its allies of the Five Eyes group (United States, United Kingdom, Canada, New Zealand and Australia) planned to hijack […]