Blog Posts Tagged with "Surveillance"
August 15, 2012 Added by:Pierluigi Paganini
FinFisher is a powerful cyber espionage agent developed by the Gamma Group that is able to secretly spy on a target's computers, intercepting communications, recording every keystroke and taking complete control of the host. The spyware was developed for law enforcement and government use...
August 04, 2012 Added by:Electronic Frontier Foundation
Congress has been working to pass cybersecurity legislation for years – and EFF has fought to ensure that civil liberties weren’t sacrificed in the process. This year was the hardest: Congress got closer than ever to enacting a bill that could threaten the privacy of online communications. We fought back...
July 19, 2012 Added by:Electronic Frontier Foundation
Senator Rockefeller was skeptical about the industry’s claims that they needed to engage in pervasive tracking for cybersecurity purposes. He stated: “I just want to declare the whole cybersecurity matter a total red herring.” We agree that strong cybersecurity does not necessitate surveillance of our browsing habits...
July 16, 2012 Added by:Electronic Frontier Foundation
A new campaign using Blackshades Remote Controller has been discovered via a message sent from a compromised Skype account. This malware gives an attacker the ability to execute arbitrary code on the infected computer. There is no guarantee that the attacker has not installed additional malicious software...
July 10, 2012 Added by:Pierluigi Paganini
Tor Project found a vulnerability in Cyberoam DPI where all share the same digital certificate and the private key is the same for every device. The implications are serious, as it could be possible to catch traffic from any user by extracting the key and importing it into other DPI devices for interception...
July 10, 2012 Added by:Electronic Frontier Foundation
A few members of Congress have been trying to get the Obama administration to answer a question: How many Americans’ phone calls or emails have been and are being collected without a warrant under the FISA Amendments Act of 2008? Unfortunately, no one else in the government seems to want that question answered...
July 09, 2012 Added by:Headlines
“Law enforcement agencies are looking for a needle, but what are they doing with the haystack? We need to know how law enforcement differentiates between records of innocent people, and those that are subjects of investigation, as well as how it handles, administers, and disposes of this information..."
July 03, 2012 Added by:Electronic Frontier Foundation
Congress has attempted to legislate in favor of corporations and law enforcement at the expense of its users’ basic rights. Netizens’ strong desire to keep the Internet open and free has been brushed aside as naïve and inconsequential, in favor of lobbyists and special interest groups. Well, no longer...
July 02, 2012 Added by:Pierluigi Paganini
The problem is the security of these vehicles, which are based on high-tech components, and we know that nothing is totally secure. US drones are exploitable, possibly allowing hackers to take control. A team of researchers from the University of Texas at Austin recently conducted a successful hack...
June 28, 2012 Added by:Pierluigi Paganini
Anonymizing services are based on the concept of distribution of routing information during a transmission. It is not known prior the path between a source and destination, and every node of the network manages minimal information to route the packets to the next hop without preserving history of the path...
June 26, 2012 Added by:Electronic Frontier Foundation
In three separate lawsuits that have been churning in the federal courts, the government has used a menu of dodges to block the courts from considering the key underlying question — have they been breaking the law and violating the constitution by warrantlessly surveilling American citizens — over and over again...
June 24, 2012 Added by:Dan Dieterle
A lot of telephones and communication devices now use VoIP to communicate over the internet. I was wondering how hard it would be to listen to a VoIP phone call if you had a packet capture that included the call. Well, come to find out, it is not hard at all. The feature is built into Wireshark - here's how...
May 24, 2012 Added by:Electronic Frontier Foundation
The Netherlands is the first country in Europe to establish a legal framework supporting net neutrality. The law contains language that restricts when ISPs can wiretap users, and limits the circumstances under which ISPs can cut off a subscriber's Internet access altogether...
May 10, 2012 Added by:Electronic Frontier Foundation
The FAA finally released the names of the government agencies which applied for and received authorization to fly drones in the US. Unfortunately, the list did not include what drones were authorized, what they were being used for, or what information they were collecting...
May 09, 2012 Added by:Pierluigi Paganini
The FBI is working to obtain a backdoor for major social networks like Facebook and also for some of the most used communications platforms such as Skype and Instant Messaging for government surveillance, and is collaborating with companies like Microsoft, Google and Yahoo...
April 19, 2012 Added by:Electronic Frontier Foundation
Documents prove warrantless cell phone tracking “has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show...
Today's Mobile Device Data Protection Must G... Mike Keller on 03-03-2015
The Three Human Failures Behind Remote Acces... Jeanson Ancheta on 03-03-2015
Top 10 Phishing Attacks of 2014... Arun Budida on 03-03-2015