cyber espionage
Groklaw shuttered because email is no longer safe
Since 2003, Pamela Jones – then a simple paralegal, now a journalist and editor – covered legal news regarding free and open source software on her law blog …
UK agents detain Greenwald’s partner, destroy The Guardian’s hard drives
It has been an eventful weekend for The Guardian newspaper, its reporter Glenn Greenwald and his partner David Miranda, as the British police held the latter and questioned …
Lavabit owner risks arrest for not complying with surveillance order
The incessant revelations fueled by the documents leaked by NSA whistleblower Edward Snowden have made people reevaluate their expectations of privacy and their beliefs on …
NSA internal audit reveals thousands of privacy violations
An internal NSA audit document and several other seen by The Washington Post journalists prove that there have been over a 1,000 violations of FISA and presidential executive …
Mega plans to offer encrypted email service
With Lavabit’s closure and Silent Circle’s shutdown of its Silent Mail, the question is where to turn next for a secure email service. Prims-break.org has a few …
Obama defends surveillance programs, promises more oversight
Late last Friday, US president Barack Obama has held a press conference centered mostly on US surveillance programs, the details of which have been leaked, bit by bit, by …
Black Code: Inside the Battle for Cyberspace
If anyone knows what's really going on in cyberspace and which forces threaten stability and security, it's Ronald Deibert and his colleagues from the well known and reputed …
NSA tips off law enforcement, asks them to keep the practice secret
Just days after the NYT wrote about the NSA denying other federal intelligence agencies access to their surveillance tools comes the disclosure that a US Drug Enforcement …
German Minister calls for punishment of US companies involved in NSA spying
The revelations of mass online spying by US government agencies that involved cooperation from the British and the German governments and intelligence services, as well as the …
Researchers hack femtocells, record mobile phones’ calls, SMS traffic
Intercepting voice calls, SMS messages, and web traffic coming and going from a target’s mobile phone may be as simple as waiting for his phone to associate to a …
New leaks say NSA can see all your online activities
If you have followed the unfolding of the NSA surveillance scandal, you have probably heard the mantra “It’s only metadata!” repeated many times by US …
Huawei’s Chinese connection continues to be source of suspicion
A day after it was announced that the UK government will investigate the employees at the Huawei’s Cyber Security Evaluation Center located in Banbury, Oxfordshire, …
Featured news
Resources
Don't miss
- When companies merge, so do their cyber threats
- Strategic AI readiness for cybersecurity: From hype to reality
- Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques
- The future of authentication: Why passwordless is the way forward
- Hertz data breach: Customers in US, EU, UK, Australia and Canada affected