Please turn on your JavaScript for this page to function normally.
U.S. tech companies sharing bug info with U.S. govt before releasing fixes

A recent report by Bloomberg’s Michael Riley has revealed that a great many U.S.-based companies are voluntarily sharing sensitive information with the U.S. national …

Asia-wide targeted campaign drops backdoor, RAT

A new and widespread phishing campaign has been discovered targeting businesses and government institutions across Asia, Trend Micro reports. Telecoms, oil and gas companies, …

Oppose PRISM-like programs today or lose you privacy tomorrow

I used to work for a telecommunication company. The government had access to call records, although the process for obtaining any information required manual requests and …

Reactions from the security community to the NSA spying scandal

Last week a whistleblower created quite the stir when he leaked documents about PRISM, a surveiilance program by the NSA. Below are comments on this scandal that Help Net …

NSA whistleblower reveals himself, world reacts

This last week has been the most eventful one in infosec history since I can remember. An (at the time unnamed) whistleblower has rocked the world by disclosing documents that …

Video with NSA whistleblower Edward Snowden

This video features an interview with Edward Snowden, the man behind the most significant intelligence leak in U.S. history. Copyright © 2013 Praxis Films / Laura Poitras.

Spyware sold to foreign governments aimed at U.S. woman critical of Turkish movement

A failed phishing attempt aimed at an unnamed woman openly critical of the G??len Movement has revealed that spyware created for lawful intercept purposes is being used for …

Chinese army announces drill to test its digitalized forces

The Chinese People’s Liberation Army (PLA) has announced it will be holding a military exercise in June, aimed at testing “new types of combat forces including …

U.S. weapons systems designs reportedly stolen by hackers

Hackers – more than likely Chinese – have stolen designs for two dozen U.S. weapons systems during a series of raids, a previously undisclosed section of a report …

APT1 is back, attacks many of the initial U.S. corporate targets

The APT1 hacker group is back to its old tricks, targeting a big number of organizations and businesses and, among them, many of those that they have previously breached, …

U.S. DOJ accuses journalist of espionage

Last week’s revelation that the U.S. DOJ has successfully subpoenaed two months’ worth of telephone toll records for phones of AP journalist has created quite an …

Aurora attackers were looking for Google’s surveillance database

When in early 2010 Google shared with the public that they had been breached in what became known as the Aurora attacks, they said that the attackers got their hands on some …

Don't miss

Cybersecurity news