searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

surveillance

Get our top stories in your inbox

CloudPets connected toys can be turned into remote surveillance devices

March 1, 2017

The CloudPets data breach saga continues, as Spiral Toys finally reported the breach to the California Attorney General’s Office. As a reminder: Leaked data provided to …

The failure of EU’s regulation on cyber-surveillance tech exports

February 27, 2017

When in April 2016 the Italian Ministry of Economical Progress revoked Hacking Team’s licence to export their Galileo remote control software outside of the EU, it …

How IDF soldiers’ phones got turned into spying devices

February 20, 2017

For many months now, an unknown threat actor has been tricking servicemen in the Israel Defense Forces (IDF) into installing Android spyware. Israeli media says that the …

Egyptian civil society NGOs targeted with sophisticated phishing

February 2, 2017

In the last few months, a number of Egyptian civil society organizations, lawyers, journalists, and independent activists have been targeted with personalized and generic …

How money-hungry data brokers erode privacy in China

January 24, 2017

A recent expose by Southern Metropolis Daily, a Chinese daily newspaper known for its investigative reporting, has revealed that random people with enough money at their …

Brother and sister arrested for spying on Italian politicians for years

January 12, 2017

Two Italian siblings have been arrested on Monday and stand accused of having spied on Italian politicians, state institutions and law enforcement agencies, businesses and …

Internet freedom around the world keeps decreasing

November 23, 2016

For the sixth year in a row, Internet freedom is declining. According to the latest Freedom on the Net report, 67 percent of all Internet users now live in countries where …

Dangerous Android threat points to Italian spyware maker

November 16, 2016

A piece of Android spyware recently analyzed by researchers with the RedNaga Security team seemed to be yet another Hacking Team spying tool but, according to more recent …

New users flock to ProtonMail in wake of Trump’s victory

November 14, 2016

Following Donald Trump’s victory in the latest US presidential election, many people begun to worry about the surveillance capabilities that will now effectively be left …

Unregulated use of facial recognition tech threatens people’s privacy, civil rights

October 19, 2016

Facial recognition tech is a boon to law enforcement, but without strict regulation and safeguards, it poses considerable risks to the privacy, civil liberties, and civil …

Twitter, Facebook revoke access to social media surveillance software used by cops

October 13, 2016

Geofeedia, a US-based company that offers its social media aggregation platform “to a broad range of private and public sector clients”, also numbers among its …

Yahoo scanned incoming emails on behalf of US intelligence

October 5, 2016

In 2015, Yahoo created custom software for covertly scanning their customers’ incoming emails, and deployed it on behalf of a US intelligence agency, Reuters reported on …

Posts navigation

1 2 3 4 5 6 7 8 … 29

Featured news

  • BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones
  • Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!
  • Mastering microsegmentation for enterprise applications
Download guide: Evaluating third-party security platforms

What's new

BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones

Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!

Mastering microsegmentation for enterprise applications

Cardiologist charged for use and sale of ransomware

Don't miss

BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones

Kali Linux 2022.2 released: Desktop enhancements, tweaks for the terminal, new tools, and more!

Cardiologist charged for use and sale of ransomware

Mastering microsegmentation for enterprise applications

Why cyber security can’t just say “no“

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Data centers on steel wheels: Can we trust the safety of the railway infrastructure?
  • Good end user passwords begin with a well-enforced password policy
  • Keep your digital banking safe: Tips for consumers and banks
  • Is cybersecurity talent shortage a myth?

(IN)SECURE Magazine ISSUE 71 (March 2022)

  • Why security strategies need a new perspective
  • The evolution of security analytics
  • Open-source code: How to stay secure while moving fast
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise