The security audit of the popular encryption software TrueCrypt reveals the absence of the backdoor and other significant flaws exploitable by…
The last collection of top-secret slides leaked by Snowden and disclosed by media agencies reveal the hacking capabilities and platforms…
Security researchers developed a new BIOS bootkit that exploit recently discovered vulnerabilities. The experts will present their study to the…
A new interesting report published by The Intercept details the effort spent by the US intelligence to compromise the security…
A new collection of documents leaked by Edward Snowden shines light on shadowy New Zealand surveillance activities operated at the…
Researchers hack NSA’s website with only $104 and 8 hours of Amazon’s cloud computing power using the #FREAK vulnerability A…
New secret documents leaked by Snowden reveal that CSE monitors millions of Canadian emails to Government, but privacy advocates criticized…
SIM maker Gemalto confirmed that unknown hackers targeted its systems in the period indicated by Snowden, but denied any massive…
The NSA Director Rogers urges the creation of an independent legal framework to regulate the operations conducted US authorities. The…
US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile…
This website uses cookies.