government
Lead MEP presents preliminary conclusions on NSA inquiry
The European Parliament should consent to a trade deal with the US only if it makes no reference to data protection, says its Civil Liberties Committee in the preliminary …
India set to escalate Internet surveillance
The Indian government is all but set to launch Netra (Network Traffic Analysis), a surveillance system capable of analysing online communication in near real-time and …
NSA can easily decrypt private cell calls
A document from the seemingly inexhaustible trove delivered by former NSA contractor Edward Snowden shows that the NSA can easily break the old and weak algorithm still used …
NSA uses Google cookies to track and target suspects
Newly published documents from Edward Snowden’s trove show that the NSA and its British counterpart GCHQ use Google’s “preferences” cookies to follow …
US phone carriers and wireless surveillance of Americans
As part of his ongoing investigation into wireless surveillance of Americans by law enforcement, US Senator Edward J. Markey released responses from eight major wireless …
FBI used spying malware to track down terror suspect
Court documents related to a recent FBI investigation have revealed that the agency has been permitted to try to compromise with spying malware the computer of a potential …
DARPA’s games crowdsource discovery of software flaws
The Defense Advanced Research Projects Agency (DARPA) has developed a series of games aimed at discovering whether large numbers of non-expert users can perform formal …
Tech giants call for government surveillance reform
Eight Internet giants have formally urged the US president and Congress to reform and limit government surveillance, and have offered several suggestions on how to do it. AOL, …
Microsoft promises wide-reaching encryption, more transparency
It took them a while, but Microsoft is finally announcing a concentrated effort to protect its customers and their data from unauthorised government surveillance. “Like …
Top 20 Critical Security Controls not popular with federal IT pros
The National Security Agency created a best security practices list for their customers, which was later expanded through a large-scale community project initiated by the SANS …
Lavabit founder submits final arguments in potentially game-changing privacy case
The saga surrounding secure email provider Lavabit and its legal fight against the US government continues with a reply brief filed last Friday by the former, arguing that …
Large-scale net traffic misdirections and MitM attacks detected
Man-In-the-Middle BGP route hijacking attacks are becoming regular occurrences, but it’s still impossible to tell who is behind them, and what their ultimate goal is, …
Featured news
Resources
Don't miss
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation