Edward Snowden

GCHQ mass internet surveillance was unlawful, IPT rules

The Investigatory Powers Tribunal has considered unlawful the GCHQ access to information gathered by the NSA through its massive surveillance…

11 years ago

Regin and Qwerty keylogger are linked with Five Eyes Intelligence

Experts at Kaspersky Lab compared the Regin module 50251 and the "Qwerty" keylogger discovering that they share part of the…

11 years ago

Snowden reveals that China stole plans for a new F-35 aircraft fighter

Snowden's documents reveal China stole designs for the US-built F-35 Fighter jet, and provides details also a counter-intelligence operation run…

11 years ago

WhatsApp implements encryption by default on Android OS

WhatsApp implemented the encryption by default on Android OS with the collaboration of the Open Whisper company. Soon it will…

11 years ago

China considers cybersecurity a primary need

China calls for stronger cybersecurity to respond the aggressive cyber-war conducted against its systems by Western countries. It's not a mystery,…

11 years ago

Treasure Map – Fiveeyes tap into German telco networks to map end devices

Documents leaked by Snowden reveal the existence of the Treasure Map program run by FiveEyes Intelligence agencies to control the…

11 years ago

Bogus cellphone towers found in the US

CryptoPhone 500 security firm has found 17 bogus cellphone towers in the US with a heavily customized handset exploited for…

11 years ago

NSA XKeyscore targeted Tor Directory Authority servers

The German broadcaster ARD published a report that reveals that NSA XKeyscore has targeted two Germany-based Tor Directory Authority servers.…

12 years ago

How many queries US Intelligence agencies made to Section 702 content data in 2013?

A letter revealed that all the US Intelligence agencies have queried the Section 702 communications content for US persons in…

12 years ago

Al-Qaeda is developing new Encryption tools in response to NSA surveillance

Recorded Future published a report to show that members of Al-Qaeda are developing a series of new encryption software in…

12 years ago

This website uses cookies.