surveillance

Erdogan Emails: WikiLeaks blocked in Turkey after the release of 300K government emails

The Turkish Government blocked the access to WikiLeaks after release of the Erdogan emails, 300,000 government emails date 2010 to…

10 years ago

Tor and Linux Users Are Extremists? The NSA Thinks So

The National Security Agency (NSA) has reportedly turned its focus on Tor and Linux users, having recently shown a keen…

10 years ago

Boffins spotted over 100 snooping Tor HSDir nodes spying on Dark Web sites

Two security experts have conducted a study that allowed them to spot over 100 snooping Tor HSDir Nodes spying on…

10 years ago

The NSA wants to exploit IoT devices for surveillance and sabotage

The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance…

10 years ago

British MPs emails are routinely accessed by GCHQ

New documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs…

10 years ago

Unlimited surveillance capabilities, but it’s going to cost you

Israeli company Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities on any cell phone on the planet. Israeli-based company…

10 years ago

Iran orders media companies to store data in the country

Iran orders foreign social media and instant messaging companies to use servers in the country to store all data related…

10 years ago

Why surveillance firm Blue Coat was granted a powerful encryption certificate?

Experts discovered that the Controversial Surveillance firm Blue Coat was granted a powerful encryption certificate that can be used for…

10 years ago

Phineas Fisher hacked a bank to support anti-capitalists in the Rojava region

Phineas Fisher, the notorious Hacking Team hacker, stole $10,000 from a bank and donated the equivalent in Bitcoin to Kurdish…

10 years ago

Telephone metadata by NSA can reveal deeply personal information

A study conducted by the NSA confirms that telephone metadata from phone logs reveals individuals’ Personal Information to government surveillance…

10 years ago

This website uses cookies.