surveillance
Video surveillance on Cisco Unified Computing System
Cisco announced that its Video Surveillance software is available on the Unified Computing System (Cisco UCS) platform, now in use by more than 11,000 customers. Cisco …
Syrian dissidents claim government uses malware to spy on them
Syrian opposition activists have been targeted by the government since the start of the massive anti-government protests in January 2011, but only recently they have began to …
FBI in the market for app to monitor social networks
The US FBI is looking into the possibility of using an “Open Source and social media alert, mapping, and analysis application” for increasing its situational …
Police system compromised due to parental spying
The Patras program, used by the German Federal Police for surveillance and tracking of suspects and their vehicles via GPS, has recently been suspended for a while and its …
SDK advances face recognition for large surveillance systems
Neurotechnology announced VeriLook Surveillance 2.0, a SDK for biometric face identification using live video streams from single or multiple high-resolution digital …
EU wants firms to stop selling surveillance tools to repressive regimes
We are all aware of the fact that some regimes have no qualms about spying on their citizens in order to keep tabs on dissenters. Nevertheless, last week’s revelation by …
Cybercrime and Espionage
The authors, seasoned experts in the information security field with obvious intelligence insights, provide the readers with an interesting overview of the current biggest …
Flash bug allows spying of website visitors through webcam
A slight variation of a previously designed clickjacking attack that used a Adobe Flash vulnerability has once again made it possible for website administrators to …
How the German “Federal Trojan” was actually used
After the Chaos Computer Club hackers made public the results of their analysis of a few samples of the so-called “Federal Trojan” and found it capable of more …
Law enforcement increasingly asking Internet companies to share data
The fact that one can find out a lot about a person’s interests, movements and opinions from their Facebook and Twitter accounts, Google searches and messages exchanged …
A new approach to circumventing state-level Internet censorship
A group of researchers led by J. Alex Halderman, assistant professor of electrical engineering and computer science at the University of Michigan, have been working on a new …
Did U.K. journalists use malware to spy on people?
The scandal that led to the demise of U.K. newspaper News of the World and to an investigation into the illegal methods used by journalists and editors in order to acquire …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains