surveillance
Tor cannot protect you from targeted surveillance
In the wake of all the revelations about mass Internet surveillance efforts by the US NSA, a lot of users but also many businesses and government agencies around the world …
Toshiba launches HDDs for surveillance applications
Toshiba launched the MD03ACA-V series, high-capacity hard disk drives for surveillance applications. Toshiba’s purpose-built line of 3.5-inch HDDs are available in …
NSA allegedly puts backdoors on American-made network devices
Glenn Greenwald’s new book titled No Place to Hide is out today. Aside from telling the story of how he worked with NSA whistleblower Edward Snowden and journalist Laura …
Reset the Net action aims to thwart online mass surveillance
A group of over 30 Internet companies and civil liberties, environmental and political organizations have announced a global call to action aimed at making mass Internet …
US DOJ asks Supreme Court to allow warrantless cell phone search
“Kill switches” for mobile phones seems like a great idea for discouraging rampant mobile phone theft going on in the US. As a matter of fact, a bill introduced to …
NSA subverted EU privacy laws, spied on human rights orgs
In a testimony delivered by video-link from Moscow, NSA whistleblower Edward Snowden has revealed to EU parliamentarians that the US NSA is actively spying on human rights …
Yahoo encrypts traffic between data centers, plans for encrypted Messenger
Newly appointed Yahoo CISO Alex Stamos has announced on Wednesday that the company has begun fully encrypting all the traffic moving between its data centers. The move was …
NSA and GCHQ spied on German satcomms, world governments’ leaders
Another week, another explosive revelation coming from Edward Snowden’s archive of NSA documents. This time they reveal the widespread compromise of several German …
Additional NSA-backed code found in RSA crypto products
A group of professors and researchers from several universities in the US and the Netherlands have tested the exploitability of various implementations of the infamous …
Mylar: A system that protects data against server-side snooping
A group of researchers from the Massachusetts Institute of Technology and Meteor Development Group have created a system for building Web services that woud protect data …
NSA compromised Huawei’s servers, spied on its executives
For years, the US government has been very vocal about its distrust of Chinese telecommunication giant Huawei, pointedly blocking acquisitions and takeovers that would allow …
NSA targets sys admins to breach computer networks
A newly analyzed document from Edward Snowden’s trove show that the NSA collects personal and account information on system administrators and uses it to compromise …
Featured news
Resources
Don't miss
- Former ransomware negotiators allegedly targeted US firms with ALPHV/BlackCat ransomware
 - How nations build and defend their cyberspace capabilities
 - Uncovering the risks of unmanaged identities
 - Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI