surveillance
How-to guide to protecting yourself from electronic spying
The Electronic Frontier Foundation (EFF) launched its updated Surveillance Self-Defense report, a comprehensive how-to guide to protecting yourself from electronic spying for …
Tor Browser 4.0, Tails 1.2 are out
The Tor Project has released version 4.0 of its popular eponymous browser that allows users to use the Internet anonymously and privately, and to circumvent online censorship …
Researchers unearth Xsser mRAT, Chinese iOS spyware
Researchers looking into the mobile malware attack directed against Hong Kong protesters using Android devices have discovered that the attackers can also target iOS device …
Seagate Surveillance HDD features recovery services
Seagate released a dedicated surveillance HDD featuring Seagate Rescue services. Engineered specifically for surveillance and video analytics applications, the Surveillance …
Apple drops the “warrant canary” from transparency report
In the wake of the change of Apple’s Privacy Policy, and the encryption technology used in iOS 8 that makes it “not technically feasible” for Apple to …
With iOS 8, Apple won’t be able to unlock phones for the police
With the release of iOS 8, Apple has also updated its Privacy Policy. “The changes were made predominantly to cover new features in iOS 8, or to provide additional …
Video: Reactions of engineers under GCHQ surveillance
Filmmakers Katy Scoggin and Laura Poitras follow reporter Marcel Rosenbach as he informs the staff of a German communications firm that they have been targeted for …
Yahoo’s fight against US govt secret surveillance revealed
Unsealed documents from Yahoo’s challenge to the expansion of US surveillance laws in 2007 and 2008 have shown how the company was ultimately made to comply to the US …
Cellphone surveillance systems can track almost anybody
The surveillance tech industry is booming, and we should be worried about it. Poorly regulated and exceedingly secretive, the companies that create surveillance solutions for …
NSA’s metadata search engine used by US, foreign agencies
The NSA has secretly built a “Google-like” search engine to be used by various US government agencies and intelligence agencies of the Five Eyes countries to sift …
Competition to crack a virtual terrorist HDD, break into CCTV systems
Sophos is calling amateur security talent to turn sleuth and to investigate confiscated crime scene computer systems belonging to a cyber terrorist group as part of the latest …
Russian government offers money for Tor-cracking tech
The Russian Ministry of Internal Affairs (MVD) has published a tender offering $111,000 to any Russian company or organization that can provide technology that can …
Featured news
Resources
Don't miss
- How neighbors could spy on smart homes
- How the City of Toronto embeds security across governance and operations
- Hottest cybersecurity open-source tools of the month: October 2025
- OpenAI’s gpt-oss-safeguard enables developers to build safer AI
- Sanctions won’t stop cyberattacks, but they can still “bite”