On Friday, the UK High Court has declared Data Retention and Investigatory Powers Act (DRIPA) unlawful.
How did Hacking Team make sure that its Remote Control System (RCS) spyware will remain on targets' computers even if they reinstall their OS, format their hard drives or install a new hard disk? The answer is: by using a UEFI BIOS rootkit.
The Hacking Team data leak has shown us with whom the company does business with, and their employees' and management's unguarded opinions about various individuals, companies, and institutions around the world.
Today, FBI director James Comey and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to address the US Senate Judiciary Committee about law enforcement's need to have access to increasingly encrypted communications.
Who hacked Hacking Team, the Milan-based company selling intrusion and surveillance software to governments, law enforcement agencies and (as it turns out) companies? A hacker who goes by "Phineas Fisher" claims it was him (her? them?): The hacker has also previously compromised UK-based Gamma International, another provider that sells their spying wares to governments, and which has also been named an "enemy of the Internet." Phineas Fisher says there will be more similar hacks in the future: In the meantime, Hacking Team is scrambling to minimize the damage this hack and data leak is doing to the company.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.