Read more about surveillance
Bookmark and Share
  • NSA's metadata search engine used by US, foreign agencies

    26.08.2014

    The NSA has secretly built a “Google-like” search engine to be used by various US government agencies and intelligence agencies of the Five Eyes countries to sift through phone call, email, and Internet chat metadata, as well as cellphone locations collected and stored in a number of different databases.

  • Competition to crack a virtual terrorist HDD, break into CCTV systems

    01.08.2014

    Sophos is calling amateur security talent to turn sleuth and to investigate confiscated crime scene computer systems belonging to a cyber terrorist group as part of the latest Cyber Security Challenge.

  • Russian government offers money for Tor-cracking tech

    28.07.2014

    The Russian Ministry of Internal Affairs (MVD) has published a tender offering $111,000 to any Russian company or organization that can provide technology that can de-anonymize users of the Tor anonymity network and decrypt the data sent through it.

  • What influences corporate security strategies?

    28.07.2014

    Sixty eight percent of businesses stated that the NSA breach by Edward Snowden and the number of PoS system breaches in the past year were the most impactful in terms of changing security strategies to protect against the latest threats.

  • Metadata-hiding Dark Mail protocol soon to be reality

    21.07.2014

    At the Hackers on Planet Earth X (HOPE X) conference held this weekend in New York, NSA whistleblower Edward Snowden called for hackers, coders and developers to "help build a better future by encoding our rights into the programs and protocols upon which we rely everyday." He was talking about encryption, but also about "padded protocols" that would prevent intelligence agencies from discovering who was talking to who by analyzing Internet traffic, and mixed routing.




Spotlight

How to keep your contactless payments secure

Posted on 19 September 2014.  |  Fraudsters can pickpocket a victim’s financial data using low-cost electronics that can fit into a rucksack. Here are the top security threats you should be aware of if you’re using a RF-based card, along with our top safety tips to keep your payments secure.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //