Read more about surveillance
Bookmark and Share
  • Hacking Team spyware survives on target systems with help of UEFI BIOS rootkit


    How did Hacking Team make sure that its Remote Control System (RCS) spyware will remain on targets' computers even if they reinstall their OS, format their hard drives or install a new hard disk? The answer is: by using a UEFI BIOS rootkit.

  • More of Hacking Team's capabilities and questionable actions revealed


    The Hacking Team data leak has shown us with whom the company does business with, and their employees' and management's unguarded opinions about various individuals, companies, and institutions around the world.

  • Security experts explain to US, UK governments why mandated encryption backdoors are a bad idea


    Today, FBI director James Comey and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to address the US Senate Judiciary Committee about law enforcement's need to have access to increasingly encrypted communications.

  • Hacking Team scrambling to limit damage brought on by explosive data leak


    Who hacked Hacking Team, the Milan-based company selling intrusion and surveillance software to governments, law enforcement agencies and (as it turns out) companies? A hacker who goes by "Phineas Fisher" claims it was him (her? them?): The hacker has also previously compromised UK-based Gamma International, another provider that sells their spying wares to governments, and which has also been named an "enemy of the Internet." Phineas Fisher says there will be more similar hacks in the future: In the meantime, Hacking Team is scrambling to minimize the damage this hack and data leak is doing to the company.

  • Flaw allows hijacking of professional surveillance AirLive cameras


    Nahuel Riva, a research engineer from Core Security, discovered vulnerabilities in AirLive’s surveillance cameras designed for professional surveillance and security applications.


VPN protocol flaw allows attackers to discover users' true IP address

The team running the Perfect Privacy VPN service has discovered a serious vulnerability that affects all VPN providers that offer port forwarding, and which can be exploited to reveal the real IP address of users.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Tue, Dec 1st