surveillance
Large cyber espionage emanating from India
Norman Shark uncovered a large and sophisticated cyber-attack infrastructure that appears to have originated from India. The attacks, conducted by private threat actors over a …
Researcher refuses to help Saudi telco to spy on people
You would think that a Saudi Arabian telecom firm interested in monitoring its users’ mobile communications would not be asking a well-known pro-privacy researcher such …
U.S. govt secretly obtains AP phone records
A letter received by the Associated Press’ general counsel has revealed that the DOJ has successfully subpoenaed two months’ worth of telephone toll records for …
U.S. judge says FBI can’t hack crime suspect’s computer
A judge of the U.S. District Court for the Southern District of Texas has denied FBI’s petition to install spying software on and using the built-in camera of an …
Digital cameras easily turned into spying devices, researchers prove
Users’ desire to share things online has influenced many markets, including the digital camera one. Newer cameras increasingly sport built-in Wi-Fi capabilities or allow …
Who are the enemies of the Internet?
In their latest report on online surveillance, Reporters Without Borders have named Bahrain, China, Iran, Syria and Vietnam as “state enemies” of the Internet due …
Bank of America says leaked data did not come from their systems
Bank of America has confirmed that some of the data included in the massive leak by Anonymous-affiliated group “Par:AnoIA” does belong to them, but that it …
Encryption no longer seen as just an IT issue
There has been a steady increase in the deployment of encryption solutions used by organizations over the past eight years. The percentage of overall IT security spending …
China-based hackers infiltrated New York Times’ network
The New York Times’ computer systems and network has been breached and its journalists’ private computers and email correspondence spied on for a period of four …
FISAA legalizes surveillance of EU citizens and their cloud data, claims study
When the Foreign Intelligence Surveillance Amendments Act (FISAA) was extended for another 5 years thanks to a majority vote in the U.S. Senate late last year, there …
Video surveillance for critical IT systems
NetWrix has announced its new User Activity Video Reporter tool that acts like a surveillance camera for critical servers and other IT systems by recording user activity for …
Get ready for invited break-ins, malware-ridden apps and spoof attacks
It’s that time of year again when, it seems, every technology vendor suddenly becomes clairvoyant with an insatiable urge to predict the battles we need to arm ourselves …
Featured news
Resources
Don't miss
- When loading a model means loading an attacker
- 4 ways to use time to level up your security monitoring
- Hackers claim to have plundered Red Hat’s GitLab repos
- Oracle customers targeted with emails claiming E-Business Suite breach, data theft
- Building a mature automotive cybersecurity program beyond checklists