Blog Posts Tagged with "Surveillance"

03b2ceb73723f8b53cd533e4fba898ee

FinFisher: The Cyber Espionage Tool Found Everywhere

August 15, 2012 Added by:Pierluigi Paganini

FinFisher is a powerful cyber espionage agent developed by the Gamma Group that is able to secretly spy on a target's computers, intercepting communications, recording every keystroke and taking complete control of the host. The spyware was developed for law enforcement and government use...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

A Victory Over Cyber Spying

August 04, 2012 Added by:Electronic Frontier Foundation

Congress has been working to pass cybersecurity legislation for years – and EFF has fought to ensure that civil liberties weren’t sacrificed in the process. This year was the hardest: Congress got closer than ever to enacting a bill that could threaten the privacy of online communications. We fought back...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Ad Biz Disregards User Choices to Safeguard "Cybersecurity"

July 19, 2012 Added by:Electronic Frontier Foundation

Senator Rockefeller was skeptical about the industry’s claims that they needed to engage in pervasive tracking for cybersecurity purposes. He stated: “I just want to declare the whole cybersecurity matter a total red herring.” We agree that strong cybersecurity does not necessitate surveillance of our browsing habits...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

AttacksTargeting Activists Uses Blackshades Trojan

July 16, 2012 Added by:Electronic Frontier Foundation

A new campaign using Blackshades Remote Controller has been discovered via a message sent from a compromised Skype account. This malware gives an attacker the ability to execute arbitrary code on the infected computer. There is no guarantee that the attacker has not installed additional malicious software...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Cyberoam DPI Vulnerability Alarms Tor Project

July 10, 2012 Added by:Pierluigi Paganini

Tor Project found a vulnerability in Cyberoam DPI where all share the same digital certificate and the private key is the same for every device. The implications are serious, as it could be possible to catch traffic from any user by extracting the key and importing it into other DPI devices for interception...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Obama Administration Won't Discuss NSA Email Surveillance

July 10, 2012 Added by:Electronic Frontier Foundation

A few members of Congress have been trying to get the Obama administration to answer a question: How many Americans’ phone calls or emails have been and are being collected without a warrant under the FISA Amendments Act of 2008? Unfortunately, no one else in the government seems to want that question answered...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Law Enforcement Sought 1.3 Million Cell Phone Records in 2011

July 09, 2012 Added by:Headlines

“Law enforcement agencies are looking for a needle, but what are they doing with the haystack? We need to know how law enforcement differentiates between records of innocent people, and those that are subjects of investigation, as well as how it handles, administers, and disposes of this information..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Time for Congress to Pledge to Uphold Internet Freedom

July 03, 2012 Added by:Electronic Frontier Foundation

Congress has attempted to legislate in favor of corporations and law enforcement at the expense of its users’ basic rights. Netizens’ strong desire to keep the Internet open and free has been brushed aside as naïve and inconsequential, in favor of lobbyists and special interest groups. Well, no longer...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Drones Vulnerable to Hijacking, Raising Concerns for Security

July 02, 2012 Added by:Pierluigi Paganini

The problem is the security of these vehicles, which are based on high-tech components, and we know that nothing is totally secure. US drones are exploitable, possibly allowing hackers to take control. A team of researchers from the University of Texas at Austin recently conducted a successful hack...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Right to Internet Anonymity and Legal Implications

June 28, 2012 Added by:Pierluigi Paganini

Anonymizing services are based on the concept of distribution of routing information during a transmission. It is not known prior the path between a source and destination, and every node of the network manages minimal information to route the packets to the next hop without preserving history of the path...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Government Insists It Can’t Be Sued Over Warrantless Wiretapping

June 26, 2012 Added by:Electronic Frontier Foundation

In three separate lawsuits that have been churning in the federal courts, the government has used a menu of dodges to block the courts from considering the key underlying question — have they been breaking the law and violating the constitution by warrantlessly surveilling American citizens — over and over again...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Wireshark: Listening to VoIP Conversations from Packet Captures

June 24, 2012 Added by:Dan Dieterle

A lot of telephones and communication devices now use VoIP to communicate over the internet. I was wondering how hard it would be to listen to a VoIP phone call if you had a packet capture that included the call. Well, come to find out, it is not hard at all. The feature is built into Wireshark - here's how...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

The Netherlands Passes Net Neutrality Legislation

May 24, 2012 Added by:Electronic Frontier Foundation

The Netherlands is the first country in Europe to establish a legal framework supporting net neutrality. The law contains language that restricts when ISPs can wiretap users, and limits the circumstances under which ISPs can cut off a subscriber's Internet access altogether...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Drones, Secret Surveillance, and Classifying the Wizard of Oz

May 10, 2012 Added by:Electronic Frontier Foundation

The FAA finally released the names of the government agencies which applied for and received authorization to fly drones in the US. Unfortunately, the list did not include what drones were authorized, what they were being used for, or what information they were collecting...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The FBI, Content Monitoring, Backdoors and Going Dark

May 09, 2012 Added by:Pierluigi Paganini

The FBI is working to obtain a backdoor for major social networks like Facebook and also for some of the most used communications platforms such as Skype and Instant Messaging for government surveillance, and is collaborating with companies like Microsoft, Google and Yahoo...

Comments  (4)

7ddc1f3000a13e4dfec28074e9e7b658

Warrantless Cell Phone Tracking, Drones, and FBI Surveillance

April 19, 2012 Added by:Electronic Frontier Foundation

Documents prove warrantless cell phone tracking “has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked