Edward Snowden

NSA and GCHQ target security firm including KasperskyNSA and GCHQ target security firm including Kaspersky

NSA and GCHQ target security firm including Kaspersky

Documents leaked by Edward Snowden show the NSA and the GCHQ efforts to compromise security software companies including Kaspersky Lab.…

10 years ago
Astoria, the Tor client designed to beat the NSA surveillanceAstoria, the Tor client designed to beat the NSA surveillance

Astoria, the Tor client designed to beat the NSA surveillance

A team of security researchers announced to have developed Astoria, a new Tor client designed to beat the NSA and…

10 years ago
Tails 1.4 is out to preserve your privacy and anonymityTails 1.4 is out to preserve your privacy and anonymity

Tails 1.4 is out to preserve your privacy and anonymity

The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user…

10 years ago
Skynet, the US top-secret program to track terroristsSkynet, the US top-secret program to track terrorists

Skynet, the US top-secret program to track terrorists

Snowden revealed the existence of Skynet, a system designed by the NSA for online monitoring of terrorists and suspects through…

10 years ago
How to discover NSA Quantum Insert attacks on your systemsHow to discover NSA Quantum Insert attacks on your systems

How to discover NSA Quantum Insert attacks on your systems

Security experts at Fox-IT have developed a method for detecting NSA Quantum Insert attacks and have published an interesting post…

10 years ago
Slides reveal Canadian CSE secret hacking capabilitiesSlides reveal Canadian CSE secret hacking capabilities

Slides reveal Canadian CSE secret hacking capabilities

The last collection of top-secret slides leaked by Snowden and disclosed by media agencies reveal the hacking capabilities and platforms…

10 years ago
Snowden reveals New Zealand surveillance Waihopai BaseSnowden reveals New Zealand surveillance Waihopai Base

Snowden reveals New Zealand surveillance Waihopai Base

A new collection of documents leaked by Edward Snowden shines light on shadowy New Zealand surveillance activities operated at the…

10 years ago
SIM Maker Gemalto Confirms cyber attacks, but excludes key theftSIM Maker Gemalto Confirms cyber attacks, but excludes key theft

SIM Maker Gemalto Confirms cyber attacks, but excludes key theft

SIM maker Gemalto confirmed that unknown hackers targeted its systems in the period indicated by Snowden, but denied any massive…

10 years ago
NSA Director Rogers urges the creation a legal framework for the US authoritiesNSA Director Rogers urges the creation a legal framework for the US authorities

NSA Director Rogers urges the creation a legal framework for the US authorities

The NSA Director Rogers urges the creation of an independent legal framework to regulate the operations conducted US authorities. The…

10 years ago
Great SIM Heist – docs reveal mass cell phone hack by Five Eyes intelligenceGreat SIM Heist – docs reveal mass cell phone hack by Five Eyes intelligence

Great SIM Heist – docs reveal mass cell phone hack by Five Eyes intelligence

US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile…

10 years ago