Please turn on your JavaScript for this page to function normally.
EU politicians want to suspend banking data-sharing program

Following the claims that the NSA has spied on the Belgian-based Society for Worldwide Interbank Financial Telecommunication (SWIFT) – the organization that provides the …

With crypto being insecure, whom do you trust?

Last week’s revelation that the NSA has for years now concentrated on subverting the encryption that protects commerce and banking transactions, sensitive data, e-mails, …

NSA’s quest to subvert encryption, install backdoors

Journalists from the NYT and ProPublica have joined efforts and have published the most explosive article to date dealing with revelations about NSA spying efforts. Backed by …

Head of INTERPOL on the key to protecting cyberspace

With the physical and virtual worlds becoming increasingly interconnected, INTERPOL Secretary General Ronald K. Noble told the Underground Economy 2013 conference at the world …

AT&T’s massive call detail record database accessible to DEA agents

Since 2007, AT&T employees have been working side by side with US Drug Enforcement Administration and local law enforcement agents, helping them access electronic call …

Microsoft and Google continue to press US government over transparency

Brad Smith, Microsoft’s general counsel, announced that Google and Microsoft are tired of waiting for the US government to allow them to publish sufficient data relating …

Government employees realize the importance of cyber security

Despite high awareness in the public sector about cyber-security risks and the threat to national security, government officials feel that not enough attention has been placed …

Detailed US intelligence community’s $52.6 billion budget leaked

Leaked by NSA whistleblower Edward Snowden and analyzed by The Washington Post reporters, the summary of the $52.6 billion US National Intelligence Program budget for the 2013 …

Hacker admits to selling access to company networks, supercomputers

A Pennsylvania man pleaded guilty today to charges stemming from his participation in a scheme to hack into computer networks and sell access to those networks. Andrew James …

G-20 themed emails deliver spying malware to EU, Canadian officials

The topic of the G-20 summit that is scheduled to be held in Russia next month is being misused by multiple cyber espionage groups some of which have been tracked to China, …

How did Snowden steal the NSA documents and cover his tracks?

Many things have been unveiled by the documents leaked by NSA whistleblower Edward Snowden, but the question of how he managed to extract them from the agency’s internal …

Poorly redacted court filing reveals Google contested NSL gag order

A court filing that has been improperly redacted and has recently been made public by the US Department of Justice shows that Google asked a US court to remove the gag order …

Don't miss

Cybersecurity news