Learn more about the EFF scoreboard for secure, encrypted communication options online and what the future holds. Online communications have been increasing rapidly over the past few years. However, there are many incidents revealing Internet surveillance. If you think of Edward Snowden and the revelations that he had brought to the public about NSA and […]
The Government of the Kazakhstan makes it mandatory for its citizens to install rogue security certificates to monitor them online. The Government of the Kazakhstan plans to implement a new internet control policy for all the population starting from January 1st 2016, and to accomplish that will order the population to install some rogue security […]
The British GCHQ has been accused of illegal Computer Network Exploitation activities by Privacy International and internet service providers. The British intelligence is responsible of “persistent” illegal hacking of electronic devices and networks worldwide, the Investigatory Powers Tribunal (IPT) has been told. The popular whistleblower Edward Snowden disclosed a collection of documents revealing the extent of surveillance […]
A Russian manufacturer has built an advanced system for the protection of any channels of telephone communication against wiretapping. The Russian Government has a new system for the protection of communication channels against the wiretapping, the news was disclosed by the director general of the Interstate Corporation of Development (ICD), Ivan Polyakov, and it was reported by […]
Documents published by the UK Government reveal that the UK’s National Crime Agency has the hacking capabilities, so called equipment interference. We have debated for a long time about hacking capabilities of principal law enforcement and intelligence agencies. Many documents leaked by the whistleblower Edward Snowden revealed that the UK intelligence agency, the GCHQ has the […]
The CISA cyber security bill passes US Senate despite tech giants, privacy advocates, and civil liberties groups express their disappointment. The US Senate voted overwhelmingly to pass a version of the Cybersecurity Information Sharing Act (CISA), a bill that has been debated for a long because it will authorize government pervasive monitoring of citizens. Many politicians, tech […]
Motherboard has obtained a non-public email sent by the Hacking Team CEO to its customers that announce a new generation of hacking tools. Hacking Team is the popular surveillance company that suffered a serious data breach this year. More than 400 GB of its sensitive data were exfiltrated from the Italian company, including internal emails, zero-day exploits, surveillance […]
A group of researchers demonstrated that it is possible to build a Low-cost IMSI catcher for 4G/LTE networks to track phone locations. IMSI catcher for 4G/LTE networks are very expensive devices that allow tracking phone locations. Now a group of researchers has found a way to track devices using the latest LTE standard for mobile networks, but with a very […]
A flaw affecting the way encryption software implements the Diffie-Hellman key exchange algorithm allowed the NSA to break trillions of encrypted connections. Edward Snowden has revealed to the world that the NSA was able to crack also the almost encryption to conduct a large-scale online surveillance. According to Snowden, the intelligence Agency was able to decrypt […]
Apple has removed mobile apps from the iOS Apple store that are installing root CA certificates that enable traffic to be intercepted. Apple has pulled several apps out from the official iOS App Store over SSL/TLS security concerns, this means that the security issues could allow threat actors to compromise encrypted connections between the servers […]