Read more about government
Bookmark and Share
  • Security experts explain to US, UK governments why mandated encryption backdoors are a bad idea

    08.07.2015

    Today, FBI director James Comey and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to address the US Senate Judiciary Committee about law enforcement's need to have access to increasingly encrypted communications.

  • Hacking Team scrambling to limit damage brought on by explosive data leak

    07.07.2015

    Who hacked Hacking Team, the Milan-based company selling intrusion and surveillance software to governments, law enforcement agencies and (as it turns out) companies? A hacker who goes by "Phineas Fisher" claims it was him (her? them?): The hacker has also previously compromised UK-based Gamma International, another provider that sells their spying wares to governments, and which has also been named an "enemy of the Internet." Phineas Fisher says there will be more similar hacks in the future: In the meantime, Hacking Team is scrambling to minimize the damage this hack and data leak is doing to the company.

  • Man gets 50 months in prison hacking U.S.-based financial institutions

    06.07.2015

    Qendrim Dobruna, a member of an international cybercrime syndicate, was sentenced to 50 months’ imprisonment and restitution in the amount of $14 million for his role in hacking into the computer systems of U.S.-based financial institutions, stealing prepaid debit card data, and eliminating withdrawal limits.

  • Hacking Team hacked, 400GB+ of company documents and emails leaked

    06.07.2015

    Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the world, has been hacked.

  • NIST revises security publication on random number generation

    30.06.2015

    In response to public concerns about cryptographic security, the National Institute of Standards and Technology (NIST) has formally revised its recommended methods for generating random numbers, a crucial element in protecting private messages and other types of electronic data.




Spotlight

Best practices for ensuring compliance in the age of cloud computing

Here are the major considerations organizations should incorporate into their compliance programs, as well as pitfalls that can be avoided to ensure businesses stay compliant while using cloud computing.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Sep 3rd
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //