surveillance
Researchers create searchable database of intelligence operators
The researchers behind Transparency Toolkit, a venture whose goal is to develop source software to collect and analyze publicly available data on surveillance and human rights …
NSA surveillance since Snowden revelations is strong as ever
A Thycotic survey of 202 RSA Conference 2015 attendees found that 94% feel that NSA’s surveillance of U.S. citizens has increased or remained the same since Edward Snowden …
70 bad exit nodes used in attack against Tor-based SIGAINT
Darknet email service SIGAINT, which aims to provide email privacy to journalists, has been targeted by unknown attackers using at least 70 bad exit nodes, the service’s …
US tech giants urge Congress to curb mass digital surveillance
As the date of the expiry of Section 215 of the USA PATRIOT Act draws near, a wide range of tech companies, privacy advocates, and trade associations have asked the US …
Multifunctional Vawtrak malware now updated via favicons
The Vawtrak (aka Snifula) multifunctional malware has been around since mid-2013. Its information-stealing, backdoor and spying capabilities deservedly earned it the …
Gemalto says NSA and GCHQ intrusions “probably happened”
“The investigation into the intrusion methods described in the document and the sophisticated attacks that Gemalto detected in 2010 and 2011 give us reasonable grounds …
Citizenfour awarded Oscar for Best Documentary
Film director Laura Poitras’ Citizenfour has been recognized as past year’s Best Documentary Feature by the Academy of Motion Picture Arts and Sciences. Most of …
Gemalto announces investigation of massive SIM heist
Yesterday’s report by The Intercept hit the information security community like a ton of bricks, as a set of documents from Edward Snowden’s trove indicate that …
Arabic cyber espionage group attacking high profile victims
Kaspersky Lab discovered Desert Falcons, a cyber-espionage group targeting high profile organizations and individuals from Middle Eastern countries. The list of targeted …
Be careful when talking in front of a Samsung SmartTV
Owners of Samsung SmartTVs that use its Voice Recognition feature to control the device should be aware that everything they say in front of their smart television set may end …
Canarywatch: Keeping track of warrant canaries
In the post-Snowden world, the term “warrant canary” – indicating a method used by some communications service providers to let their users know that they …
Canada’s spy agency monitors file downloads around the world
After NSA whistleblower Edward Snowden shared the documents he exfiltrated from the agency with select journalists, the revelations that stemmed from them have mostly focused …
Featured news
Resources
Don't miss
- How neighbors could spy on smart homes
- How the City of Toronto embeds security across governance and operations
- Hottest cybersecurity open-source tools of the month: October 2025
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI
- Sanctions won’t stop cyberattacks, but they can still “bite”