Please turn on your JavaScript for this page to function normally.
Federal cyber security pros lack confidence in FISMA

A report by MeriTalk and NetApp examines the state of cyber security at Federal agencies and looks at whether the Federal Information Security Management Act (FISMA) is …

HP helps government agencies protect information

HP announced HP Continuous Monitoring, designed to identify and report IT security vulnerabilities in real time. The solution provides U.S. government agencies with an …

Largest Belgian telecom breached by the NSA?

Belgacom, primarily state owned and the largest telecom in Belgium, has announced that its internal IT systems have been breached and compromised with malware by an …

FBI confirms they were behind Freedom Hosting’s takeover

An FBI agent testifying at the court hearing where the subject of bail for Freedom Hosting owner Eric Eoin Marques was discussed has confirmed that the FBI has, indeed, had a …

NSA impersonated Google in MitM attacks

After all the recent revelations about the NSA and their surveillance and encryption-foiling activities, would it surprise you to know that the agency or its British …

NSA says illegal data collection was caused by too complex tech

NSA’s repeated claims about having its surveillance apparatus under control have taken another hit after the agency has been legally forced to publish a huge batch of …

EU debates NSA surveillance impact and media freedom

The impact of US National Security Agency and other surveillance programs on EU citizens’ privacy and media freedom and the lack of democratic oversight of these …

EU politicians want to suspend banking data-sharing program

Following the claims that the NSA has spied on the Belgian-based Society for Worldwide Interbank Financial Telecommunication (SWIFT) – the organization that provides the …

With crypto being insecure, whom do you trust?

Last week’s revelation that the NSA has for years now concentrated on subverting the encryption that protects commerce and banking transactions, sensitive data, e-mails, …

NSA’s quest to subvert encryption, install backdoors

Journalists from the NYT and ProPublica have joined efforts and have published the most explosive article to date dealing with revelations about NSA spying efforts. Backed by …

Head of INTERPOL on the key to protecting cyberspace

With the physical and virtual worlds becoming increasingly interconnected, INTERPOL Secretary General Ronald K. Noble told the Underground Economy 2013 conference at the world …

AT&T’s massive call detail record database accessible to DEA agents

Since 2007, AT&T employees have been working side by side with US Drug Enforcement Administration and local law enforcement agents, helping them access electronic call …

Don't miss

Cybersecurity news