GCHQ

GCHQ mass internet surveillance was unlawful, IPT rules

The Investigatory Powers Tribunal has considered unlawful the GCHQ access to information gathered by the NSA through its massive surveillance…

11 years ago

USA and UK announce joint cyber ‘war games’ to improve cyber defenses

The United States and the U.K. announced that they will stage joint cyber "war games" to boost both countries' resilience…

11 years ago

British Prime Minister wants to ban Online Messaging Apps including WhatsApp

Prime Minister Cameron said that the UK would pursue banning encrypted messaging apps if the Intelligence was not given access…

11 years ago

New security flaws in the SS7 protocol allow hackers to spy on phone users

German researchers have announced the discovery of news security flaws in SS7 protocol that could be exploited by an attacker…

11 years ago

GCHQ launches Cryptoy mobile app to teach cryptography

Cryptoy is the free educational app about cryptography designed by GCHQ for use by secondary school students and their teachers.…

11 years ago

UK – A new GCHQ-NCA unit will catch pedophiles in the Deep Web

Prime Minister Cameron announced that a newborn cyber unit composed by officials from GCHQ and NCA will fight online pedophiles…

11 years ago

British firm now owned by Vodafone aided GCHQ in wiretapping undersea cables

New documents leaked by Snowden reveal the crucial role of a Vodafone-owned company in wiretapping of undersea cables for massive…

11 years ago

ISIS issued a manual for a safe use of Twitter and other media

The ISIS has released a manual for its militants, titled “How to Tweet Safely Without Giving out Your Location to…

11 years ago

Treasure Map – Fiveeyes tap into German telco networks to map end devices

Documents leaked by Snowden reveal the existence of the Treasure Map program run by FiveEyes Intelligence agencies to control the…

11 years ago

A dark wing of the intelligence supports the Tor Project

Experts working at US and UK Intelligence agencies on monthly base leak Tor vulnerabilities to the developers at the Tor…

11 years ago

This website uses cookies.