NSA letter reveals details of NSA analysts spying on their lovers
Details of twelve recorded cases since 2003 in which analysts misused US intelligence agencies’ surveillance capabilities to spy on their love interest or other not …
Legislation aims to end bulk collection of phone records
In order to restore the constitutional liberties that have been eroded by invasive surveillance and end secret interpretations of the law that vastly exceed the intent of …
US government security background checks fumbled by investigators
Edward Snowden’s successful exfiltration of confidential NSA documents has proved that the background checks executed for government personnel in order to receive the …
Industry leaders perceive numerous security threats to their data
An overwhelming majority of business leaders believe their customers and clients worry about breaches of personal data held by their organizations. Unisys-sponsored research …
Organizations fear their privacy activities are insufficient
The perceived level of maturity attached to organizations’ privacy activities has decreased since 2011, as many organizations deem their existing privacy activities to …
Data broker databases breached, stolen info used by ID theft service
Stolen users information is regularly sold and bought online by cyber crooks and attackers, and many services have sprung up to meet the demand for information that can be …
MEPs raise suspension of EU-US bank data deal
MEPs raised the possibility of suspending or even terminating the EU-US Terrorist Finance Tracking Programme (TFTP), during the discussion on Tuesday about the NSA’s …
30 Percent of transactions conducted from Tor are fraudulent
iovation announced that 30.2 percent of transactions conducted from Tor (the onion router) in August were fraudulent. This compared with an overall fraud rate of 1 percent for …
Travelers regularly connect to free, unsecure Wi-Fi networks
GFI Software announced the findings of an extensive independent research project looking at end user use of mobile devices at work and in their daily commute to and from the …
Video: NSA hearing in the European Parliament
Embedded below is the full video of the NSA hearing in the Human Rights Committee (LIBE) in the European Parliament 5 September 2013, which runs at 03:25 hours. Courtesy of …
Largest Belgian telecom breached by the NSA?
Belgacom, primarily state owned and the largest telecom in Belgium, has announced that its internal IT systems have been breached and compromised with malware by an …
Proof-based system to secure the car
The digital systems in today’s connected car, including engine, infotainment and telematics systems, provide communications, numerous conveniences, information, safety, …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise