Edward Snowden

GCHQ mass internet surveillance was unlawful, IPT rulesGCHQ mass internet surveillance was unlawful, IPT rules

GCHQ mass internet surveillance was unlawful, IPT rules

The Investigatory Powers Tribunal has considered unlawful the GCHQ access to information gathered by the NSA through its massive surveillance…

10 years ago
Regin and Qwerty keylogger are linked with Five Eyes IntelligenceRegin and Qwerty keylogger are linked with Five Eyes Intelligence

Regin and Qwerty keylogger are linked with Five Eyes Intelligence

Experts at Kaspersky Lab compared the Regin module 50251 and the "Qwerty" keylogger discovering that they share part of the…

10 years ago
Snowden reveals that China stole plans for a new F-35 aircraft fighterSnowden reveals that China stole plans for a new F-35 aircraft fighter

Snowden reveals that China stole plans for a new F-35 aircraft fighter

Snowden's documents reveal China stole designs for the US-built F-35 Fighter jet, and provides details also a counter-intelligence operation run…

10 years ago
WhatsApp implements encryption by default on Android OSWhatsApp implements encryption by default on Android OS

WhatsApp implements encryption by default on Android OS

WhatsApp implemented the encryption by default on Android OS with the collaboration of the Open Whisper company. Soon it will…

11 years ago
China considers cybersecurity a primary needChina considers cybersecurity a primary need

China considers cybersecurity a primary need

China calls for stronger cybersecurity to respond the aggressive cyber-war conducted against its systems by Western countries. It's not a mystery,…

11 years ago
Treasure Map – Fiveeyes tap into German telco networks to map end devicesTreasure Map – Fiveeyes tap into German telco networks to map end devices

Treasure Map – Fiveeyes tap into German telco networks to map end devices

Documents leaked by Snowden reveal the existence of the Treasure Map program run by FiveEyes Intelligence agencies to control the…

11 years ago
Bogus cellphone towers found in the USBogus cellphone towers found in the US

Bogus cellphone towers found in the US

CryptoPhone 500 security firm has found 17 bogus cellphone towers in the US with a heavily customized handset exploited for…

11 years ago
NSA XKeyscore targeted Tor Directory Authority serversNSA XKeyscore targeted Tor Directory Authority servers

NSA XKeyscore targeted Tor Directory Authority servers

The German broadcaster ARD published a report that reveals that NSA XKeyscore has targeted two Germany-based Tor Directory Authority servers.…

11 years ago
How many queries US Intelligence agencies made to Section 702 content data in 2013?How many queries US Intelligence agencies made to Section 702 content data in 2013?

How many queries US Intelligence agencies made to Section 702 content data in 2013?

A letter revealed that all the US Intelligence agencies have queried the Section 702 communications content for US persons in…

11 years ago
Al-Qaeda is developing new Encryption tools in response to NSA surveillanceAl-Qaeda is developing new Encryption tools in response to NSA surveillance

Al-Qaeda is developing new Encryption tools in response to NSA surveillance

Recorded Future published a report to show that members of Al-Qaeda are developing a series of new encryption software in…

11 years ago