Security Experts Slam Cameron Over Encryption Ban Proposal

British Prime Minister David Cameron has come under fire for promising to ban encrypted and ephemeral messaging apps if he is re-elected later this year. His comments came just a few days after the Paris terrorist attacks. In a speech earlier this week, Cameron pledged new surveillance powers to combat terrorist communications. “In our country, Read More


US Senator Introduces Bill To Ban FBI Backdoors in Devices

US Senator Ron Wyden has introduced a new bill that bans the government from planting backdoors into US tech electronics and software. The ‘Secure Data Act’ is aimed to protect data security and privacy of all US citizens. The Oregon senator’s bill specifically bans agencies from forcing software developers and device manufacturers to modify their Read More

NSA Program Auroragold Designed to Crack into Carrier Networks

This Thursday, Glenn Greenwald released a new set of leaks from the Snowden files on behalf of his publication The Intercept, which detail yet another program which handily oversteps nearly every boundary of personal privacy it can, while shunting any sense of common decency to the side in pursuit of some disillusioned sense of the Read More

EFF Criticizes FBI Comments on Encryption Backdoors

The Electronic Frontier Foundation (EFF) has responded to remarks made by the FBI’s director on phone encryption, calling them “bad law”. FBI Director James Comey, much like many law enforcement officials of late, had criticized Apple’s plans to encrypt phones by default. He called for a change in the law to allow backdoors for law Read More

Sentry Eagle

NSA’s ‘Core Secrets’ Programs Put Plants in Top Tech Firms

This weekend, a new set of NSA documents were released by Glenn Greenwald’s new online publication platform The Intercept, detailing a secret set of programs that involve everything from agents being hired to work at foreign telecoms, to cozy relationships between the agency and phone manufacturers that allow them to break the encryption of any Read More

troels oerting

Head of Europol Cybercrime: Encryption is Unacceptable

The growth of encrypted communication channels is unacceptable according to Troels Oerting, head of Europol’s cybercrime unit, in an interview recently with the BBC. “Imagine in the physical world if you were not able to open the trunk of a car if you had a suspicion that there were weapons or drugs inside… we would Read More

China Approves the iPhone 6 Despite Security Concerns

China has approved the iPhone 6 for sale in the country despite previous security concerns over Apple’s new flagship device. October 17 has been set as the official release date after Apple passed a number of regulatory hurdles and proved to the Chinese authorities that no backdoors exist in the device that could be exploited Read More


Verizon Introduces QR Codes For User Authentication

Fed up with entering passwords for user authentication? Verizon thinks it has a solution. The company has announced ‘Universal ID’, a service that will replace usernames and passwords with a QR code login that consumers can scan with their smartphones to gain access to apps and websites. Enterprises can deploy this new type of login Read More


Airport Security Equipment Vulnerable To New Hacks

Airport security has advanced rapidly in the last decade, but according to the findings of a security researcher, the guardians of the airport, using some of the most advanced monitoring machines (luggage x-rays, backscatter machines, trace scanning detectors, explosive-sniffing computers, etc.), have a security issue of their own to worry about. At the Black Hat Read More

Black Hat Speaker Reveals SATCOM Vulnerabilities

On Thursday, IOACTIVE Principal Security Consultant Reuben Santamarta described how a malicious attacker could breach satellite communications (SATCOM) systems for ships and aircraft. Santamarta’s presentation at Black Hat USA 2014 received considerable attention and speculation prior to his August 7 briefing. Santamarta presented his findings based on the IOACTIVE white paper SATCOM Terminals: Hacking by Read More

Chinese Government Labels iPhones a “National Security Concern”

Last week, a state-run Chinese media outlet alleged that the iPhone was one of the “least secure” smartphones that residents of the country could depend on when it came to keeping the location of their movements under wraps. The iPhone, which contains a manual toggle to choose whether or not a user is “Frequently Located” Read More


Software-Based Backdoor Discovered in Police Surveillance Equipment

This Wednesday, researchers from the Internet security outfit SEC Consult revealed their report which claims that dozens of surveillance devices and software programs used by local law enforcement to spy on citizens are flawed, containing a litany of backdoors and compromised code that allows ordinary citizens to eavesdrop on active investigations. Provided primarily by Israel-based Read More


New Snowden Leak: NSA Backdoors All US Made Routers

In the latest turn of events, fresh documents from Edward Snowden and Glenn Greenwald reveal that the NSA has secretly been placing easily accessible backdoors into the routers manufactured and distributed by companies like Linksys, Cisco, and Netgear before they are shipped overseas. According to an excerpt from Greenwald’s new book “No Place to Hide”, Read More


Obama Okays NSA Zero-Day Policy

President Obama has announced that his administration would now require the NSA to publish any unknown zero-day viruses, malware, backdoors, and exploits they discover in the interest of national security. Under one condition… Of course, that condition is about as flexible, stetchable, and malleable as it could possibly be, only requiring the NSA to provide Read More

US Government Makes DDoS Protection Mandatory for Banks

This week, the Federal Financial Institutions Examination Council released their six-step plan to better protect major financial institutions from the rampant threat of online DDoS attacks. For anyone out of the loop, DDoS attacks occur when a hacker launches the collective might of dozens, hundreds, or even thousands of computers at a single website at Read More

IBM Denies Involvement with NSA or GCHQ

IBM have joined the ranks of companies like Microsoft, Yahoo, AOL, Google and Facebook, when they informed the press that they had not and have not ever colluded with the American or British government in the supply of specialized backdoors into any of the equipment they manufacture for consumers and IT professionals alike. Senior VP Read More

Cisco Patches Vulnerabilities in Wireless Controllers

Cisco, normally one of the more standup providers of home wireless routers and networking tech, doesn’t often find themselves in the same position that higher profile targets such as Netgear and Linksys do. This time around the Santa Clara hardware manufacturer believes their Aironet series wireless access points were hit the hardest with a standard Read More

Microsoft Calls Government Cooperation “Economic Suicide”

This year’s RSA conference has already stirred up a whirlwind of controversy, from the developers leaving to set up their own convention across the street, to CEOs going totally off-script, and now Microsoft’s VP of the Trustworthy Computing Group Scott Charney brazenly taking the stage to deny any and all accusations of cooperation with the Read More

Mozilla Banks Mobile Future on HTML5 Security

At the Mobile World Congress this year in Barcelona, Mozilla announced their push into the Chinese, Indian, and Brazilian low-budget market with their sub-$30 lineup of smartphones and tablets that will be hitting shelves globally in 2014. Relying solely on a HTML5 web-based architecture,  Firefox OS will supposedly usher in a new era of cheap, Read More

Older Posts