Please turn on your JavaScript for this page to function normally.
AT&T’s massive call detail record database accessible to DEA agents

Since 2007, AT&T employees have been working side by side with US Drug Enforcement Administration and local law enforcement agents, helping them access electronic call …

Persistent adversaries can identify Tor users

Using the Tor network will not you grant perfect anonymity – in fact, a group of researchers from the US Naval Research Laboratory and Georgetown University say that …

NetTraveler APT group is back, adds watering hole attacks to its arsenal

The “Red Star” APT group employing the NetTraveler malware family is still active, but has changed its modus operandi. Its targets remain the same: government …

Privacy case makes your phone untrackable

With all the recent revelations about NSA’s long cyber reach and the (in)voluntary involvement of big Internet companies and US telecoms in its many surveillance …

The TAO of NSA

In last week’s reports, it has been pointed out that NSA has its own hacking unit called Tailored Access Operations (TAO), and that its capabilities have been tapped for …

Microsoft and Google continue to press US government over transparency

Brad Smith, Microsoft’s general counsel, announced that Google and Microsoft are tired of waiting for the US government to allow them to publish sufficient data relating …

Detailed US intelligence community’s $52.6 billion budget leaked

Leaked by NSA whistleblower Edward Snowden and analyzed by The Washington Post reporters, the summary of the $52.6 billion US National Intelligence Program budget for the 2013 …

Facebook spamming is a hugely lucrative business

Italian researchers that have previously unearthed the big business behind fake Twitter followers have now calculated that Facebook spammers are raking in as much as $200m …

Tor usage more than doubles

Roger Dingledine, one of the original developers of Tor and current director of the Tor Project, has noted on the tor-talk mailing list that the number of Tor clients running …

Fake “Secure Document” notice will compromise your email account

Phishers have lately shown a penchant for using the “secure / confidential document / message” lure for making users share their login credentials. The latest …

New protection mechanism prevents mobile cross-app content stealing

A group of researchers from Indiana University and Microsoft Research have recently published a paper detailing the risk of cross-origin attacks on two of the most popular …

Researchers detail attacks for compromising Dropbox user accounts

Dropbox, the popular file hosting service that has managed to amass over 100 million users in the five years since it was launched, has had its fair share of problems: …

Don't miss

Cybersecurity news