Tag: ARM

Sentry Eagle

NSA’s ‘Core Secrets’ Programs Put Plants in Top Tech Firms

This weekend, a new set of NSA documents were released by Glenn Greenwald’s new online publication platform The Intercept, detailing a secret set of programs that involve everything from agents being hired to work at foreign telecoms, to cozy relationships between the agency and phone manufacturers that allow them to break the encryption of any […]

NATO Adds Cyberattacks to the ‘Hit One, Hit Us All’ Code

This week, official representatives for the NATO international collective announced they would be implementing a new set of policies which would seek to match the same outlines that apply to real-world military action in the online battleground. As more countries begin to arm themselves with increasingly complex weapons of cyberwarfare which can be used for […]


O2 & Vodafone Earn Security Certs in the UK

O2’s recent announcement of a No.10 tariff to bolster third party organizations comes shortly after the company became the first mobile operator to be awarded with CAS (T) – [secure and government approved network certification] in the United Kingdom. Now O2 and Vodafone are staking their claims as the best choice for government officials, who […]


Major Universities Explore Password Alternatives

Sophos blog Naked Security recently reported that Cambridge and Oxford are both working on modern alternatives to passwords. The Cambridge Computer Laboratory and Oxford BioChronometrics both seek to address the rising need for new alternatives to password-based authentication via their new programs Pico and eDNA, respectively. Naked Security explains: We choose them badly, we’re not […]


Tunisia Cyber-Crime Law Threatens Internet Progress

A leaked draft for a new cybercrime law in Tunisia is raising concerns among its citizens, reports Global Voices Online. In the past couple of years Tunisia has gained attention as an exemplary pioneer in recognizing Internet rights and freedoms in the MENA region. This proposed law, however, is far-reaching and vague in its language. […]

Russia Posts Open Bounty to Break Tor in Two

This week, the Russian Interior Ministry put out an open call for hackers from around the globe, and posted a large bounty for any freelance blackhats who could assist the former Soviet Union in breaking the code that makes anonymizing communications and web traffic possible. Totaling just short of four million rubles ($111,290 USD), the […]

Chinese Government Labels iPhones a “National Security Concern”

Last week, a state-run Chinese media outlet alleged that the iPhone was one of the “least secure” smartphones that residents of the country could depend on when it came to keeping the location of their movements under wraps. The iPhone, which contains a manual toggle to choose whether or not a user is “Frequently Located” […]

patent troll

Tech Giants & US House Move to Counter Patent Trolls

The US House of Representatives and corporations in Silicon Valley are taking action against excessive patent litigation, also known as “patent trolling.” The House subcommittee on Commerce, Manufacturing, and Trade drafted the Targeting Rogue and Opaque Letters (TROL) Act of 2014. Last Friday the subcommittee approved the bill to be submitted for consideration to the […]


GCHQ Manipulates Online Poll Results, Tracks Skype Users

According to new documents released by Glenn Greenwald and FirstLook.org (provided by none other than by the “Boy-Who-Must-Not-be-Named” as far as the NSA is concerned),the GCHQ has dedicated an entire wing of its surveillance arm to actively monitoring and manipulating the status of petitions, organizations, and websites at will in order to influence the public […]

Samsung KNOX Approved for UK Government Communications

Samsung’s security software has been approved for government use in the UK, gaining “official” status and taking a step ahead of Blackberry, who have specialized in government-safe devices. The decision means that Samsung’s KNOX phone, which runs Android and KNOX Workspace, a “comprehensive hardware and software security solution”, can be used by government staff for […]

More Bitcoin Mining Operations Found in the Last Place You’d Expect

In yet another discovery of Bitcoin mining malfeasance, today researchers at the SANS Institute’s Internet Storm Center have posted a notice on their blog about a new form of malware that runs off systems designed to record and store footage from security cameras. The program is unique in its ability to run on ARM architecture […]

WhatsApp Vulnerable to Critical Crypto Hole on Android

According to a blog published by a sysadmin named Bas Bosschert, the popular messaging app WhatsApp could potentially be vulnerable to a hole that allows any apps installed alongside the program on an Android phone to openly read and log any chats sent and received between users if permissions are not explicitly changed beforehand. “The […]

Google Puts Up $2.7m for Latest Bug Bounty Event

Touting one of the largest prizes ever seen in a hackathon event, Google has announced they will award just over $2.7 million USD at this year’s CanSecWest to anyone who can present the internet search company with “new or interesting” attack paths into its supposedly secure Chrome OS and Chromebook hardware suite. Researchers at the […]

US Will Talk With Snowden on Condition of Guilty Plea

The US government came forward to announce that they would be willing to speak with Edward Snowden’s lawyers on the condition that he enters a guilty plea upon his return to the States. President Obama himself is still a wash on the issue, telling the press core that his relationship to the whistleblower didn’t garner […]

Amazon Doubles as Cloud-Based Malware Host

Today, IT security firm Solutionary released their quarterly threat report, placing Amazon Web Services (Amazon’s cloud hosting arm) at the top of the list as the most popular source for malware distribution and attacks throughout North America. The damning report comes shortly after hackers supposedly utilized the Amazon cloud host to scrape the details and […]