Video: Reactions of engineers under GCHQ surveillance
Filmmakers Katy Scoggin and Laura Poitras follow reporter Marcel Rosenbach as he informs the staff of a German communications firm that they have been targeted for …
NSA’s metadata search engine used by US, foreign agencies
The NSA has secretly built a “Google-like” search engine to be used by various US government agencies and intelligence agencies of the Five Eyes countries to sift …
What influences corporate security strategies?
Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of …
Metadata-hiding Dark Mail protocol soon to be reality
At the Hackers on Planet Earth X (HOPE X) conference held this weekend in New York, NSA whistleblower Edward Snowden called for hackers, coders and developers to “help …
NIST releases report on cryptography expertise
NIST’s primary external advisory board released a report calling for the agency to increase its staff of cryptography experts and implement more explicit processes for …
Germany cancels Verizon’s government contract due to spying fears
Verizon will no longer provide internet services to a number of German government departments, as their contract has been cancelled as part of a restructuration of the federal …
Replicating NSA’s gadgets using open source
One peek at the leaked pages of NSA’s ANT catalog made wireless security researcher Michael Ossmann’s mind start spinning. “Could we – could I – …
NSA collects photos to feed facial recognition programs
The NSA has been collecting photos of people’s faces at the tune of 55,000 images every day, and has been feeding the images into its facial recognition programs, James …
China reacts to military hackers’ indictment, accuses US of hypocrisy
Yesterday, for the first time ever, the US Justice Department filed criminal charges against known state actors for hacking, as it accused five Chinese military hackers of …
NSA allegedly puts backdoors on American-made network devices
Glenn Greenwald’s new book titled No Place to Hide is out today. Aside from telling the story of how he worked with NSA whistleblower Edward Snowden and journalist Laura …
NIST drops NSA-backed algorithm from encryption recommendations
“Following a public comment period and review, the National Institute of Standards and Technology (NIST) has removed a cryptographic algorithm from its draft guidance on …
NSA subverted EU privacy laws, spied on human rights orgs
In a testimony delivered by video-link from Moscow, NSA whistleblower Edward Snowden has revealed to EU parliamentarians that the US NSA is actively spying on human rights …
Featured news
Sponsored
Don't miss
- 100+ domains seized to stymie Russian Star Blizzard hackers
- October 2024 Patch Tuesday forecast: Recall can be recalled
- Best practices for implementing threat exposure management, reducing cyber risk exposure
- Critical Ivanti Endpoint Manager flaw exploited (CVE-2024-29824)
- CUPS vulnerabilities could be abused for DDoS attacks