Post Thumbnail

British spies may be peeking into webcams and modifying internet traffic, but all that is above board -- if you ask the UK's Investigatory Powers Tribunal, anyway. Its judges have ruled that the Government Communications Headquarters' (GCHQ) intelligence gathering practices aren't violating the Eu

21 days ago 0 Comments
December 8, 2014 at 2:49AM
Post Thumbnail

There's still a dispute as to whether or not North Korean hackers broke into Sony Pictures' network, but one thing is clear: the country spoils its cyberwarriors rotten. A defector tells Reuters that Bureau 121, the spy division responsible for at least some state-sponsored internet attacks, gives

23 days ago 0 Comments
Post Thumbnail

SugarString, Verizon's news site that wouldn't cover its corporate parent's dirty laundry, is no more. It was originally set up to ape outlets like the one you're reading, except that Big Red banned discussion of spying and net neutrality. Unfortunately, just over a month since the Daily Dot expos

26 days ago 0 Comments
Post Thumbnail

Symantec said that the recently detailed Regin spyware looked like it was created for government surveillance, and there's now some strong support for that claim. Both Kaspersky Lab and Wired understand that the super-sophisticated malware was used to infiltrate both Belgian carrier Belgacom and c

1 month ago 0 Comments
Post Thumbnail

Apparently, the US government is now on a mission to bring down mobile applications offering spyware services -- which, for a variety of well-documented reasons, simply seems kind of ironic. Controversy aside though, the Department of Justice revealed today that Hammad Akbar, CEO of StealthGenie,

2 months ago 0 Comments
Post Thumbnail

It's safe to say that surveillance technology had a profound effect on American culture, even before Edward Snowden's leaks arrived -- there's a sense that you can never really escape the government's eye. If you've ever shared that feeling, you'll be glad to hear that there's finally an art exhib

3 months ago 0 Comments
Post Thumbnail

Normally, breaking a PC's security involves either finding security exploits or launching brute force attacks, neither of which is necessarily quick or easy. However, a team at Tel Aviv University has come up with a potentially much simpler way to swipe data from a computer: touch it. If you mak

4 months ago 0 Comments
Post Thumbnail

This boxy, unassuming thing you see above is what's called an IMSI catcher. In essence, they pose as miniature cell towers that mobile devices connect to and route things through. All of that information - phone numbers, call recipient, caller location - are fair game to whomever controls that box

4 months ago 0 Comments
Post Thumbnail

China has apparently decided to blacklist Apple products including the iPad and MacBook lines for official use, according to Bloomberg. The report says that the government has instructed its procurement arm not to purchase desktops, tablets and laptops from the company because of those oft-cited \"

4 months ago 0 Comments
Post Thumbnail

Back in March 2014, two United States senators accused the Central Intelligence Agency of infiltrating Senate computers. Worse, they accused the CIA of hacking Senate computer networks and accessing files while the Senate's Intelligence Committee was actively investigating CIA detention practices.

5 months ago 0 Comments
Post Thumbnail

The US isn't done throwing the book at alleged Chinese industrial spies. The Department of Justice has charged a Chinese executive living in Canada, Su Bin, with stealing sensitive info for Boeing and Lockheed Martin warplanes like the C-17 cargo hauler and F-22 fighter. Reportedly, Su partnered w

5 months ago 0 Comments
Post Thumbnail

The New York Times is reporting that Chinese hackers penetrated a US government network, likely going after the files of thousands of workers who applied for top-secret security clearances. The hackers accessed the Office of Personnel Management databases in March before they were detected and blo

5 months ago 0 Comments
Post Thumbnail

It's no secret that the NSA's surveillance efforts reach far and wide. However, we now know which sort of people get caught in that dragnet -- and most of them, it turns out, are very ordinary. About 90 percent of users in a cache of Intercepted messages (leaked by Edward Snowden to the Washington

5 months ago 0 Comments
Post Thumbnail

Cyberwarfare campaigns against Western energy grids aren't just the stuff of action movies these days -- they're very, very real. Symantec has discovered a likely state-sponsored hacking group, nicknamed Dragonfly, that has been using phishing sites and trojans to compromise energy suppliers in t

6 months ago 0 Comments