Details of twelve recorded cases since 2003 in which analysts misused US intelligence agencies' surveillance capabilities to spy on their love interest or other not authorized subjects have been revealed by NSA inspector General Dr.
In the wake of the disclosure that the NSA has influenced NIST to adopt an encryption standard that includes one random bit generator with a weakness known only to the intelligence agency, NIST has reopened the public comment period for the standard so that the public can analyze and comment on it again.
Embedded below is the full video of the NSA hearing in the Human Rights Committee (LIBE) in the European Parliament 5 September 2013, which runs at 03:25 hours.
Belgacom, primarily state owned and the largest telecom in Belgium, has announced that its internal IT systems have been breached and compromised with malware by an "unknown third party".
After all the recent revelations about the NSA and their surveillance and encryption-foiling activities, would it surprise you to know that the agency or its British counterpart GCHQ also impersonated Google, Yahoo and Microsoft in Man-in-the-Middle attacks aimed at intercepting user communications? Ryan Gallagher over at The Slate was the first to report on the revelation for the English speaking public by digging into the reporting of Brazilian TV show Fantastico, whose reporters had a chance to go through a set of documents leaked by NSA whistleblower Edward Snowden to Guardian journalist Glenn Greenwald: However, in some cases GCHQ and the NSA appear to have taken a more aggressive and controversial route—on at least one occasion bypassing the need to approach Google directly by performing a man-in-the-middle attack to impersonate Google security certificates.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.