Please turn on your JavaScript for this page to function normally.
NIST drops NSA-backed algorithm from encryption recommendations

“Following a public comment period and review, the National Institute of Standards and Technology (NIST) has removed a cryptographic algorithm from its draft guidance on …

Appeals court overturns AT&T hacker’s sentence

A US federal appeals court has vacated the conviction and sentence received by Andrew “weev” Auernheimer for the AT&T iPad hack. Auernheimer, a hacker and …

Highest EU court rejects EU-wide Data Retention Directive

It’s a good thing that the European Union is working on a new Data Retention Directive, as the European Court of Justice (ECJ) has ruled on Tuesday that the one issued …

Barrett Brown signs (sealed) plea agreement

Barrett Brown, the American journalist that – among other things – is accused of crimes related to the Stratfor hack, has reached a plea agreement with US …

NSA and GCHQ spied on German satcomms, world governments’ leaders

Another week, another explosive revelation coming from Edward Snowden’s archive of NSA documents. This time they reveal the widespread compromise of several German …

Federal agencies face outsider threats and internal ignorance

A SolarWinds cybersecurity survey among federal IT pros revealed that while the majority of respondents describe their agencies as cybersecurity-ready, many still face attacks …

Additional NSA-backed code found in RSA crypto products

A group of professors and researchers from several universities in the US and the Netherlands have tested the exploitability of various implementations of the infamous …

ACLU probes US police’s use of fake cell towers

The American Civil Liberties Union (ACLU) is on a mission to find out which local and state law enforcement forces in the US are using “stingrays” and how, but are …

NSA compromised Huawei’s servers, spied on its executives

For years, the US government has been very vocal about its distrust of Chinese telecommunication giant Huawei, pointedly blocking acquisitions and takeovers that would allow …

US tech firms knew about and assisted with PRISM data collection

In a testimony before the Privacy and Civil Liberties Oversight Board, the NSA general council Rajesh De and his colleague stated on Wednesday that the tech companies that …

Operation dismantles child exploitation enterprise on Tor network

DHS Secretary Jeh Johnson highlighted the complete results of one of the largest online child exploitation investigations in the history of ICE, involving victims in 39 states …

NSA records a country’s phone calls, keeps the records for a month

By leveraging a surveillance system dubbed MYSTIC, the US National Security Agency has been recording all phone calls made in a foreign country for a period of 30 days, newly …

Don't miss

Cybersecurity news