Please turn on your JavaScript for this page to function normally.
US Federal Court deals a blow to net neutrality

With a verdict of 3-to-0, judges of the US Court of Appeals for the District of Columbia Circuit have decided to strike down the Federal Communications Commission’s Open …

Privacy advocates announce day of protest against NSA spying

A broad coalition of activist groups, companies, and online platforms will hold a worldwide day of activism in opposition to the NSA’s mass spying regime on February …

NSA employee will remain as co-chair on crypto standards group

NSA employee Kevin Igoe will continue to be one of the two co-chairs of the Crypto Forum Research Group (CFRG), which helps the Internet Engineering Task Force (IETF) review …

Will 2014 be the year of encryption?

Security experts at Unisys predicted that the coming year will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data …

Federal agency cloud adoption increases 400%

Tripwire announced the results of a survey on cloud security technology trends in the federal government. The survey evaluated the attitudes of more than 100 federal …

Obama panel advises big changes to NSA surveillance practices

The “independent” Review Group on Intelligence and Communications Technologies ordered to be created by US president Barack Obama in August has finally delivered …

Lead MEP presents preliminary conclusions on NSA inquiry

The European Parliament should consent to a trade deal with the US only if it makes no reference to data protection, says its Civil Liberties Committee in the preliminary …

India set to escalate Internet surveillance

The Indian government is all but set to launch Netra (Network Traffic Analysis), a surveillance system capable of analysing online communication in near real-time and …

NSA can easily decrypt private cell calls

A document from the seemingly inexhaustible trove delivered by former NSA contractor Edward Snowden shows that the NSA can easily break the old and weak algorithm still used …

NSA uses Google cookies to track and target suspects

Newly published documents from Edward Snowden’s trove show that the NSA and its British counterpart GCHQ use Google’s “preferences” cookies to follow …

US phone carriers and wireless surveillance of Americans

As part of his ongoing investigation into wireless surveillance of Americans by law enforcement, US Senator Edward J. Markey released responses from eight major wireless …

FBI used spying malware to track down terror suspect

Court documents related to a recent FBI investigation have revealed that the agency has been permitted to try to compromise with spying malware the computer of a potential …

Don't miss

Cybersecurity news