The NIST has published a document for protecting Controlled Unclassified Information (CUI) when it resides on contractors IT infrastructures. The National Institute of Standards and Technology (NIST) has published a guideline, titled “Publication Citation: Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations“, for protecting Controlled Unclassified Information (CUI) when it resides on contractor IT […]
The Electronic Frontier Foundation published the “Who Has Your Back? 2015” report that ranked WhatsApp ranked as the worst in protecting users’ privacy. The Electronic Frontier Foundation has published its annual report “Who Has Your Back? 2015: Protecting Your Data From Government Requests” that analyzes how private companies handlesusers data with specific focus on Government surveillance. “Which […]
NIST is seeking more advanced tattoo forensic analysis, matching the tattoos into a computer system could help law enforcement to catch more offenders. One in five American adults has at least one tattoo and this number is much higher among the criminal population. Law enforcement has used tattoos as a means of criminals and victim […]
Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group. According to a report published by Bloomberg, two men were arrested and warrants were issued for other three suspects that were allegedly preparing a terrorist attack in Belgium. The interesting part of the news is that law […]
The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, what does it means for Americans? The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, where the NSA is able to spy internet traffic in search […]
Law reforms on cloud data protection is vital for the European Commission (EC). The role of EC and EU has a compromise to perform legal priorities in cyberspace and develop markets Breaking down barriers is the dilemma for investors, companies, EU member states and lawmakers to guarantee an atmosphere of legitimacy on new European cloud […]
The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS, it urges a law to give them more powers. The FBI warned lawmakers there was no way to monitor encrypted online communications exploited by Islamic State militants and sympathizers. The law enforcement urges IT giants to provide […]
The Data âcrown jewelsâ on global Cyber Risk: New scenarios of Cyber-politics to debate on surveillance versus privacy After two-year, stop-and-go legislative effort on the controversy of section 215 of the Patriot Act, the American Senate voted in plenary 77-to-17 on Sunday-night to move a House bill forward to object political conflict on surveillance vs. […]
Two of the most popular domains of ever, that were seized by the FBI from Kim Dotcom three years ago, are now used for illegal activities. Former FBI web domains were used by crooks to serve porn or spread adware. Some of the sites that were abused by cyber criminals belong to a lot of domains that […]
The Conservatives are planning new laws to give MI5 the power to force IT giants to hand over encrypted messages from terror suspects. Potential global terrorism threats are persuading to Conservatives in UK to move the pieces of chess by law; in advance of the worldâs biggest internet companies, such as Google, Apple and Facebook […]