Please turn on your JavaScript for this page to function normally.
GCHQ
Can an automated defence network protect Britain from low-level threats?

A recent Freedom of Information request found that the number of breaches reported to the ICO in the last 12 months has nearly doubled from the previous year, so something …

Stingray
Stingray use lacks transparency and meaningful oversight

Cell-site simulators – aka Stingrays, aka IMSI catchers – are widely used by US law enforcement, usually without a warrant that such type of surveillance should …

Arrest
Two arrested for allegedly hacking senior US government officials

Andrew Otto Boggs, aka INCURSIO, and Justin Gray Liverman, aka D3F4ULT, were arrested on charges related to their alleged roles in the computer hacking of several senior US …

Berlin
German Federal Intelligence Service violates laws, dodges supervision

The German Federal Intelligence Service (BND) has been illegally collecting data through mass surveillance tools, storing it in databases that should not exist, and has …

success
How the digital revolution is transforming the US federal government

The digital revolution is dominating and transforming the work of the US federal government, and those federal agencies that develop a people first approach will stand out in …

analytics IT assets
Feds are using big data analytics for cybersecurity, but is it effective?

81 percent of Feds say their agency is using big data analytics for cybersecurity in some capacity – 53 percent are using it as a part of their overall cybersecurity strategy …

Apple iOS 9
Apple plugs three actively exploited iOS zero-days

Owners of Apple’s mobile devices are advised to upgrade to iOS version 9.3.5 as soon as possible, as it fixes three zero-day vulnerabilities actively exploited in the …

NSA
Leaked hacking tools can be tied to NSA’s Equation Group

The batch of data released by the Shadow Brokers, an entity that claims to have hacked the Equation Group, contains attack tools that can be tied to the group. Equation Group …

cloud
Should cloud vendors cooperate with the government?

More than one in three IT pros believe cloud providers should turn over encrypted data to the government when asked, according to Bitglass and the Cloud Security Alliance …

open source
In limiting open source efforts, the government takes a costly gamble

The vast majority of companies are now realizing the value of open sourcing their software and almost all have done so for at least certain projects. These days Google, …

eye
Top-level cyber espionage group uncovered after years of stealthy attacks

Symantec and Kaspersky Lab researchers have uncovered another espionage group that is likely backed by a nation-state. The former have dubbed the threat actor Strider, wile …

eye
Kazakhstan govt targeted journalists, political activists with spyware

Journalists and political activists critical of Kazakhstan’s authoritarian government, along with their family members, lawyers, and associates, have been targets of an online …

Don't miss

Cybersecurity news