Read more about surveillance
Bookmark and Share
  • Russian government offers money for Tor-cracking tech

    28.07.2014

    The Russian Ministry of Internal Affairs (MVD) has published a tender offering $111,000 to any Russian company or organization that can provide technology that can de-anonymize users of the Tor anonymity network and decrypt the data sent through it.

  • What influences corporate security strategies?

    28.07.2014

    Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of changing security strategies to protect against the latest threats.

  • Metadata-hiding Dark Mail protocol soon to be reality

    21.07.2014

    At the Hackers on Planet Earth X (HOPE X) conference held this weekend in New York, NSA whistleblower Edward Snowden called for hackers, coders and developers to "help build a better future by encoding our rights into the programs and protocols upon which we rely everyday." He was talking about encryption, but also about "padded protocols" that would prevent intelligence agencies from discovering who was talking to who by analyzing Internet traffic, and mixed routing.

  • Germany cancels Verizon's government contract due to spying fears

    27.06.2014

    Verizon will no longer provide internet services to a number of German government departments, as their contract has been cancelled as part of a restructuration of the federal government's interdepartmental communication network.

  • Cops must get a warrant before looking through cellphone content

    26.06.2014

    The nine judges of the US Supreme Court have unanimously ruled that law enforcement officers can't search the contents of an arrested individual's cell phone(s) without a search warrant.




Spotlight

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Posted on 22 October 2014.  |  A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //