A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for surveillance purposes. GnuTLS is an open source secure communicati ...
Experts that are monitoring the escalation of tension in Crimea recognized a military strategy similar to the one adopted in Georgia (2008) The approval of Russian Parliament for military use in Crim ...
Africa Security & Counter-Terrorism Summit in London Chaired by President of European Centre for Information Policy and Security ECIPS The Africa Security & Counter-Terrorism Summit held i ...
Chris Soghoian, principal technologist with the American Civil Liberties Union, explained that government surveillance could exploit service update process. Chris Soghoian, principal technologist wit ...