searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

law enforcement

Get our top stories in your inbox

Major international law enforcement operation targets airline ticket fraud

October 19, 2016

193 individuals suspected of traveling with airline tickets bought using stolen, compromised or fake credit card details have been detained in a major international law …

Twitter, Facebook revoke access to social media surveillance software used by cops

October 13, 2016

Geofeedia, a US-based company that offers its social media aggregation platform “to a broad range of private and public sector clients”, also numbers among its …

What proposed Rule 41 changes mean for your privacy

September 15, 2016

Last week, US Senator Ron Wyden took the floor of the Senate to explain why his (and his colleagues’) Stopping Mass Hacking Act should be voted in. The bill, consisting …

Stingray use lacks transparency and meaningful oversight

September 13, 2016

Cell-site simulators – aka Stingrays, aka IMSI catchers – are widely used by US law enforcement, usually without a warrant that such type of surveillance should …

Law enforcement equipment: Technology plays a complicated role

September 1, 2016

Law enforcement is challenged by the need for a balance between equipping officers with gear that will protect them while also trying to manage the appearance of acts of …

Law enforcement and IT security companies join forces to fight ransomware

July 25, 2016

Today, the Dutch National Police, Europol, Intel Security and Kaspersky Lab launched the No More Ransom initiative, a new step in the cooperation between law enforcement and …

Apple says DoJ’s request for iPhone unlocking is unconstitutional

February 26, 2016

Apple has filed a motion to vacate the earlier court order that would force them to help the FBI access the contents of the iPhone of the San Bernardino gunman by creating a …

German police allowed to use its own “federal Trojan”

February 23, 2016

The German Interior Ministry has approved for investigative use a spying Trojan developed by the German Federal Criminal Police (a so-called “federal Trojan”). In …

Apple to US govt: Withdraw demand for iPhone unlocking, we all need to talk first

February 22, 2016

The battle between Apple and the US Justice Department continues, as the company still refuses to help the feds access the contents of a PIN-locked iPhone used by gunman Syed …

Group using DDoS attacks to extort business gets hit by European law enforcement

January 12, 2016

On 15 and 16 December, law enforcement agencies from Austria, Bosnia and Herzegovina, Germany and the United Kingdom joined forces with Europol in the framework of an …

Posts navigation

1 2 3 4 5

Featured news

  • VMware issues critical fixes, CISA orders federal agencies to act immediately (CVE-2022-22972)
  • Many security engineers are already one foot out the door. Why?
  • Fix your IT weak spots to guarantee compliance
Easily migrate to the cloud with CIS Hardened Images

What's new

New infosec products of the week: May 20, 2022

Record level of bad bot traffic contributing to rise of online fraud

Two business-grade Netgear VPN routers have security vulnerabilities that can’t be fixed

Email is the riskiest channel for data security

Don't miss

Two business-grade Netgear VPN routers have security vulnerabilities that can’t be fixed

How to ensure that the smart home doesn’t jeopardize data privacy?

U.S. DOJ will no longer prosecute good-faith security researchers under CFAA

VMware issues critical fixes, CISA orders federal agencies to act immediately (CVE-2022-22972)

Many security engineers are already one foot out the door. Why?

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise