Sentry Eagle

NSA’s ‘Core Secrets’ Programs Put Plants in Top Tech Firms

This weekend, a new set of NSA documents were released by Glenn Greenwald’s new online publication platform The Intercept, detailing a secret set of programs that involve everything from agents being hired to work at foreign telecoms, to cozy relationships between the agency and phone manufacturers that allow them to break the encryption of any Read More

NATO Adds Cyberattacks to the ‘Hit One, Hit Us All’ Code

This week, official representatives for the NATO international collective announced they would be implementing a new set of policies which would seek to match the same outlines that apply to real-world military action in the online battleground. As more countries begin to arm themselves with increasingly complex weapons of cyberwarfare which can be used for Read More


O2 & Vodafone Earn Security Certs in the UK

O2’s recent announcement of a No.10 tariff to bolster third party organizations comes shortly after the company became the first mobile operator to be awarded with CAS (T) – [secure and government approved network certification] in the United Kingdom. Now O2 and Vodafone are staking their claims as the best choice for government officials, who Read More


Major Universities Explore Password Alternatives

Sophos blog Naked Security recently reported that Cambridge and Oxford are both working on modern alternatives to passwords. The Cambridge Computer Laboratory and Oxford BioChronometrics both seek to address the rising need for new alternatives to password-based authentication via their new programs Pico and eDNA, respectively. Naked Security explains: We choose them badly, we’re not Read More


Tunisia Cyber-Crime Law Threatens Internet Progress

A leaked draft for a new cybercrime law in Tunisia is raising concerns among its citizens, reports Global Voices Online. In the past couple of years Tunisia has gained attention as an exemplary pioneer in recognizing Internet rights and freedoms in the MENA region. This proposed law, however, is far-reaching and vague in its language. Read More

Russia Posts Open Bounty to Break Tor in Two

This week, the Russian Interior Ministry put out an open call for hackers from around the globe, and posted a large bounty for any freelance blackhats who could assist the former Soviet Union in breaking the code that makes anonymizing communications and web traffic possible. Totaling just short of four million rubles ($111,290 USD), the Read More

Chinese Government Labels iPhones a “National Security Concern”

Last week, a state-run Chinese media outlet alleged that the iPhone was one of the “least secure” smartphones that residents of the country could depend on when it came to keeping the location of their movements under wraps. The iPhone, which contains a manual toggle to choose whether or not a user is “Frequently Located” Read More

patent troll

Tech Giants & US House Move to Counter Patent Trolls

The US House of Representatives and corporations in Silicon Valley are taking action against excessive patent litigation, also known as “patent trolling.” The House subcommittee on Commerce, Manufacturing, and Trade drafted the Targeting Rogue and Opaque Letters (TROL) Act of 2014. Last Friday the subcommittee approved the bill to be submitted for consideration to the Read More

Older Posts