-
July 2, 2013
Skype explored how to aid law enforcement by snooping under secret ‘Project Chess’
Skype explored how to aid law enforcement by snooping under secret ‘Project Chess’: Under a program called “Project Chess,” Skype looked into some of the legal and technical challenges of making it easier for intelligence agencies to tap into Skype calls, anonymous sources tell The New York Times. The existence of the project was known by […]
-
July 2, 2013
India rolls out its own version of PRISM to spy in the name of security
India rolls out its own version of PRISM to spy in the name of security: Reuters reported this morning that India is rolling out a surveillance program that will give government agencies the ability to tap directly into emails and phone calls without oversight by courts or parliament. The government said this widespread monitoring is in an […]
-
July 1, 2013
Vulnerabilities found in code library used by encrypted phone call apps
Vulnerabilities found in code library used by encrypted phone call apps: ZRTPCPP, an open-source library that’s used by several applications offering end-to-end encrypted phone calls, contained three vulnerabilities that could have enabled arbitrary code execution and denial-of-service attacks, according to researchers from security firm Azimuth Security. ZRTPCPP is a C++ implementation of the ZRTP cryptographic key […]
-
July 1, 2013
1-15 June 2013 Cyber Attacks Timeline
1-15 June 2013 Cyber Attacks Timeline: This period has been characterized by the protests in Turkey, that, easy predictable, have also influenced the cyber landscape. Many attacks (in several cases even with noticeable impact) have been carried on in name of OpTurkey. Other noticeable facts include the attacks against the European Police College (14,000 records affected), […]
-
June 30, 2013
U.S. taps half-billion German phone, internet links in month
U.S. taps half-billion German phone, internet links in month: The United States taps half a billion phone calls, emails and text messages in Germany in a typical month and has classed its biggest European ally as a target similar to China, according to secret U.S. documents quoted by a German newsmagazine. [..] On an average day, […]
-
June 30, 2013
NSA bugged Brussels US spy story hits the EU
NSA bugged Brussels US spy story hits the EU: Bursting Brussels’ bubble, it appears the US National Security Agency has been spying on the EU institutions. German magazine Der Spiegel’s online edition cited a top secret document which outlines how the NSA specifically targeted EU offices in Washington, Brussels and New York, listening to phone calls […]
-
June 28, 2013
MIT researchers can see through walls using ‘Wi-Vi’
MIT researchers can see through walls using ‘Wi-Vi’: Researchers at MIT are experimenting with a system called Wi-Vi, which they say can track moving objects through walls by using the inexpensive, nearly ubiquitous wireless system. Wi-Vi could be built into a smartphone or a special handheld device and used in search-and-rescue missions and law enforcement, according […]
-
June 27, 2013
Facebook might have released your phone number
Facebook might have released your phone number: The personal information of more than 6 million Facebook users may have been exposed due to a security bug, Facebook announced late Friday. Due to the bug, information that Facebook normally uses to recommend friends, including emails and phone number, was included in their own contact details. So whenever users downloaded an archive of […]
-
June 27, 2013
Hackers leak US troop details
Hackers leak US troop details: An unidentified group of hackers has released details of tens of thousands of US troops to websites, according to the South Korean press. The hacking attacks were carried out on the anniversary of the start of the Korean War in 1950. They brought down the main websites of South Korea’s presidential […]
-
June 27, 2013
Opera network cracked
Opera network cracked: Opera’s Sigbjørn Vik explains that the software company identified and halted the attack on June 19. Although it’s confident that “there is no evidence of user data being compromised … the attackers were able to obtain at least one old and expired Opera code signing certificate, which they have used to sign some […]