In 2013 the FBI agents seized TorMail, now new information are emerging on the operations. Someone believes it was a surgical ops others accuse Feds of dragnet surveillance. In 2013 the FBI agents seized TorMail, at the time the most popular dark web email services. The US law enforcement agency seized the TorMail database during in concomitants of the […]

Malaysia extradited a hacker charged by DoJ with stealing the personal data of US members and passing it to the ISIS. A former computer science student accused of supporting the ISIL terrorist group has arrived in the US to face charges. The former computer science student Ardit Ferizi is charged with hacking crimes and providing support to […]

On Friday the United Nation can decide that Assange is being illegally detained, in this case the UK and Sweden must immediately release him. The United Nations will reveal very soon the results of its investigation on the case of Julian Assange, the Wikileaks founder. WikiLeaks published secret information and classified media from anonymous sources. Wikileaks already published […]

The Europol is increasing its efforts against terrorism, it has joined forces with EU to fight terrorist financing and money laundering. Since 1 January 2016, Europol has increased the level of integration among the nodes of the decentralised computer network of the European Union Member States’ Financial Intelligence Units (FIUs), the FIU.net. “FIU.NET is a decentralised computer network […]

A former Department of Energy (DoE) employee, Charles Harvey Eccleston [62], has been charged with trying to steal and sell nuclear secrets to foreign governments. A former employee at the Department of Energy (DoE), Charles Harvey Eccleston [62], has pleaded guilty of cyber espionage. The man attempted to infect al least 80 colleagues at the […]

The alleged Privacy Shield deal swaps the Safe Harbor arrangement that remained for over fifteen years before being smash down by a court in October United States and European administrators have pounded out a very late arrangement to permit data streams across the Atlantic to proceed without violating the law. “Surprisingly, the US has given […]

The UN Working Group on Arbitrary Detention ruled that Julian Assange ’ forced permanence in the Ecuadorian embassy is an “arbitrary detention.” On Friday, the commission of the United Nation decided that Julian Assange is being illegally detained since his arrest in London over four years ago. Assange has been residing in the embassy since […]

The FBI requests $38 Million to counter the threat of Going Dark, in particular asking more economic resources to break encryption when needed. The FBI Director James Comey has highlighted in different occasions the difficulties faced by law enforcement when dealing with encryption during their investigations. Now, the FBI is making its request for budget […]

The British Intelligence Agency GCHQ has a license to hack computers and devices, the UK’s Investigatory Powers Tribunal (IPT) ruled. This means that the UK Government is giving full power to its intelligence agency to spy on Britons as well as people living abroad. The verdict was issued on Friday after Privacy International and seven ISPs […]

Pakistani citizen Muhammad Sohail Qasmani admits laundering Millions from massive computer hacking and telecommunications fraud scheme. A Pakistani citizen, Muhammad Sohail Qasmani (47) admitted laundering millions of dollars as part of a massive international computer hacking and telecommunications fraud scheme. The man worked for a hacking crew that targeted US companies by hacking into their PBX […]

A US magistrate ordered Apple to help unlock San Bernardino shooter’s iPhone, be aware it is demanding a tool to bypass the security mechanism. We discussed very often of the difficulties of the law enforcement in conducting investigations when suspects used devices that make use of encryption, the case that we are going to analyze is emblematic. Apple […]

A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor hacking. In November 2015, the researchers at the Tor Project publicly accused the FBI of paying the experts at the Carnegie Mellon University to deanonymize Tor users. The experts at the Tor Project collected information about the […]

A coordinated operation of law enforcement agencies in 7 countries raided operators of darknets trading in illegal products and services. A joint effort of law enforcement agencies in seven European countries (Germany, Bosnia, Switzerland, France, the Netherlands, Lithuania and Russia) allowed authorities to identify and arrest operators of darknet online platforms trading in illegal products […]

The General Data Protection Regulation (GDPR) governs the use and privacy of EU citizens’ data and the Data Protection Directive governs the use of EU citizens’ data by law enforcement. EU Data Protection Reform was put forward in January 2012 by the European Commission to make Europe fit for the digital age. At the last […]

Brazilian authorities arrested the Facebook Vice President for Latin America accused of ignoring judicial order in drug trafficking investigation. Law enforcement worldwide is increasing their pressure on IT companies for accessing users’ data, while we are discussing the San Bernardino case (aka Apple vs FBI) another news is shocking the industry, Facebook Vice President has been arrested […]

The Romania’s High Court of Cassation and Justice ruled that the popular Romanian hacker Guccifer will be extradited to the United States. Marcel Lazar Lehel it the real name of the name of the notorious hacker Guccifer who breached the online accounts of several public figures between December 2012 and January 2014. The popular hacker […]

How VPN (virtual private networks) are being utilized for stimulation, legislative issues, and correspondence in various nations. As information security guru Bruce Schneier and his Berkman Center for Internet and Society associates brought up in a report a week ago, there are currently around 865 encryption-related items accessible all around the globe. From voice encryption […]

Snowden accuses the FBI of lying about his ability to unlock the iphone of the San Bernardino terrorist. “that’s horse sh*t.” he said. While the dispute between Apple and the FBI on the San Bernardino shooter’s iPhone case continues, the popular NSA whistleblower Edward Snowden takes a position giving us his opinion, and it is not […]

A report published by the DoD Inspector General revealed that military drones have been used for Non-Military domestic Surveillance. The US Government has admitted the use of drones for operations of domestic surveillance. The US Military clarified that all the operations were authorized by a regular warrant confirming that no legal violations were found. The news was revealed by the USA […]

A report published by the DoD Inspector General revealed that military drones have been used for Non-Military domestic Surveillance. The US Government has admitted the use of drones for operations of domestic surveillance. The US Military clarified that all the operations were authorized by a regular warrant confirming that no legal violations were found. The news was revealed by the USA […]

DOJ released a brief filing that threatens to force Apple to hand over the iOS source code if it will not help FBI in unlocKing the San Bernardino shooter’s iPhone. The battle between Apple and the FBI is going on while the debate on the case is monopolizing the media.  Last news in order of […]

A redaction error in court-ordered release of the Lavabit case files confirmed that Edward Snowden was the target of the FBI. Lavabit was an encrypted webmail service founded in 2004 by Ladar Levison, it closed on August 8, 2013 after the US authorities ordered it to turn over its Secure Sockets Layer (SSL) private keys to order government surveillance activities. […]

Three members of the Syrian Electronic Army hacker crew have been inserted by the US authorities in the list of most wanted criminals. The Syrian Electronic Army, aka SEA, is considered one of most dreaded hacking crew that first appeared in 2011. According to the report “Syrian Electronic Army – Hacktivision to Cyber Espionage?,” published in 2014, […]

Three members of the Syrian Electronic Army hacker crew have been inserted by the US authorities in the list of most wanted criminals. The Syrian Electronic Army, aka SEA, is considered one of most dreaded hacking crew that first appeared in 2011. According to the report “Syrian Electronic Army – Hacktivision to Cyber Espionage?,” published in 2014, […]

A Chinese national pleaded guilty yesterday, March 23, on charges with hacking trade secrets from US defense contractors. A Chinese national pleaded guilty yesterday, March 23, on charges with hacking trade secrets from US defense contractors. The man, Su Bin (also known as Stephen Su and Stephen Subin), 50, had been charged in a 2014 indictment with […]

US authorities announced charges against seven Iranian hackers for attacking computer systems at banks and a dam in New York. A couple of days after the US DoJ announced that three components of the Syrian Electronic Army were inserted by the FBI in the Most Wanted list, today the US authorities announced charges against seven Iranian nationals for hacking […]

FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed motion requesting the review of the ruling. A few weeks ago, a judge has ordered the FBI to reveal the complete source code for the TOR exploit to defense lawyers in a child porn case. In a […]

A Columbian hacker claims he helped the candidate Enrique Peña Nieto in winning the Mexican presidential election in 2012. Until now we have seen something of similar only in the TV series, but the reality could overwhelm the fiction because a Columbian hacker claims he helped Enrique Peña Nieto in winning Mexican presidential election. The […]

The government authority who oversees the export of “dual use” technologies revoked the Hacking Team ’s global export license. On July 2015, the Italian surveillance company Hacking Team suffered one of the worst data breaches in the history.  Unknown attackers have exfiltrated some 400Gbs of data, including internal emails, exploit source code and invoices. A few months […]

According to documents obtained by The Intercept, the CIA is looking with a great interest in a new skincare line for DNA extraction on crime scenes. According to documents obtained by The Intercept, the CIA is funding a new skincare line that can allow the agency to collect DNA. “SKINCENTIAL SCIENCES, a company with an innovative line […]

Teenage hacker developed a dangerous booter that was offered for sale, it was used to crash 224,000 websites around the world. Not always crime pays, sometimes the bill can be very salty, this is the case of a British youngster from Worcestershire, Grant Manser, that has pleaded guilty to six charges under the Computer Misuse Act and […]

The British Government is attempting to force the hacktivist Lauri Love to hand over his encryption keys to access data stored in his seized laptop. Lauri Love is the hacktivist accused of breaking into Government networks, now the UK NCA wants to oblige him to hand over encryption keys to equipment seized from his home. The […]

This week the former Reuters journalist Matthew Keys was sentenced to two years in prison for helping the Anonymous collective in computer hacking. Matthew Keys, a former Reuters journalist, who was convicted in October 2015 of supporting the Anonymous collective, has been sentenced to 24 months in prison for computer hacking charges. Keys has been […]

Investigators discovered that the hackers managed to gain access to the Bangladesh Bank network because it was using second-hand switches and no firewall. In  March, unknown hackers have stolen more than $100 million from the Bangladesh Bank account at the US Federal Reserve Bank. Now new disconcerting news regarding the Bangladesh bank is in the headlines. According […]

The Dutch police in an international effort with Canadian authorities seized the Ennetcom encrypted communication network used by 19,000 users. Another success of the Dutch law enforcement against the cybercrime. The police arrested the owner of Ennetcom, a provider of encrypted communications with more than 19,000 customers. Prosecutors suspect he was using the business to manage […]

The US Supreme Court has approved amendments to Rule 41 that allows judges issue search warrants for hack into computers located worldwide. The US Supreme Court has approved amendments to Rule 41, which now let U.S. judges issue search warrants for hacking into computers located also outside their jurisdiction. Under the original Rule 41, a […]

Employee monitoring is a complex and controversial topic that can often become the source of discontent between employers and their staff. It is not a secret that most employees have a negative opinion about modern monitoring practices, such as PC monitoring. It is often viewed as an invasion of privacy and employer overstepping their authority. […]

Doubts about a couple of draft anti car hacking laws, they could create serious problems with innocent drivers and cyber security experts. Car hacking is a scaring reality, modern vehicles use a huge quantity of connected components that could be easily compromised knowing the communication protocol used by principal vendors. The interest in car hacking gained […]

Doubts about a couple of draft anti car hacking laws, they could create serious problems with innocent drivers and cyber security experts. Car hacking is a scaring reality, modern vehicles use a huge quantity of connected components that could be easily compromised knowing the communication protocol used by principal vendors. The interest in car hacking gained […]

According to a Justice Department memo, the FISA ACT Court approved each and every request made by the government in 2015. According to a Justice Department memo, the United States Foreign Intelligence Surveillance Act (FISA) Court approved each and every request made by the government in 2015. All of the 1,457 requests made last year […]

The European Parliament’s civil liberties committee has approved new governance rules that give Europol new cyber powers to tackle down terrorists online. The Europol, the European Police Agency, gets new cyber powers to fight against terrorists online. The European Parliament’s civil liberties committee has approved new governance rules by a massive majority. The fight against […]

Email Privacy act – House of Representatives sanctioned a bill that demands authorities must obtain a court warrant before they could obtain email records. The United States House of Representatives on April 27, 2016, unanimously sanctioned a bill which demands that U.S. authorities must obtain a court warrant before they could obtain e-mail records and data […]

Arthur Budovsky, the co-founder of the online underworld bank Liberty Reserve, was sentenced to 20 years in prison for committing money laundering. Arthur Budovsky, the co-founder of the online underworld bank , was sentenced to 20 years in prison. The man had pleaded guilty to one count of conspiring to commit money laundering. He was condemned […]

The Philadelphia Police Department admitted they disguised a surveillance SUV equipped with a powerful ALPR as a Google Streetview vehicle. The Philadelphia Police Department has used a track for surveillance activity by disguising it as Google Streetview vehicle. “An SUV tucked away in the shadows of the Philadelphia Convention Center’s tunnel bears the ubiquitous logo for […]

A Slovenian student who reported configuration errors in the Tetra protocol used by the local Police gets a prison sentence. Ethical hacking could be very risky, this is the experience of a 26-year-old Slovenian student, Dejan Ornig, that had serious problems after the discovery of flaws in the Police Communications Protocol. It is incredible, but authorities […]

Analyzing the data included in the Internet Crime Compliant Center – IC3 report 2015 recently issued by the Federal Bureau of Investigation. FBI released the Internet Crime Compliant Center – IC3 report of 2015 last week. During the last calendar year, IC3 received 288,012 complaints and 44 percent of them reported financial loss equal to […]

New documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails. According to Computer Weekly, new documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails and peers. The revelations have been made public through an […]

The popular Tor developer Jacob Appelbaum left the Core Team of the Tor Project after “sexual mistreatment” allegations. Appelbaum is recognized as one of the most active and influential digital advocates and security researchers. He is one of the few reporters to have had a preview of the NSA secret documents leaked by Edward Snowden. The news is […]

According to the US GAO the FBI’s Next Generation Identification facial recognition system has access to 411.9M photos of Americans and foreigners alike. When we talk about technology, privacy and security are concepts that are often at odds. Let’s think for example of a facial recognition system, this technology could be used in many contexts […]

Earlier June the Tor Project announced a hardened version of the popular Tor Browser that implements a feature dubbed Selfrando to defeat exploits. Early June the Tor Project announced a hardened version of the popular Tor Browser, the Tor Browser 6.5a1-hardened. “A new hardened Tor Browser release is available. It can be found in the 6.5a1-hardened […]

A coalition of tech groups asked the Congress to roll back changes to Rule 41 that allowed law enforcement to do mass hacking. Congress should block the changes to the rules for the regulation of US law enforcement investigations. The rules allow law enforcement agencies hacking in computers worldwide for its investigation. In April, the […]

In these days, a new anti-terrorism bill is becoming law in Russia, it includes a large number of issues related to internet monitoring. The terrorism is one of the dreaded threats on a global scale, almost every government is spending a significant effort in order to prevent plots against their population. Modern Terrorism is technological, it makes a large […]

The United Kingdom has approved the Brexit, the decision of its citizen of leaving the Europe. Which are the first effects on cyber security? The reality behind the breakaway of the UK in the Brexit referendum vote after nearly 43 years as part of the European Union has caused many to fear the falling value […]

The US border authority seeks individuals that want to enter in the Country into providing their social media details in order to improve their screening. It is not a joke, travellers that ask for a visa waiver entry to the US may be asked to provide their social media details. I’m speaking about a proposal of […]

Report on wiretaps in 2015 suggests Americans are using less encryption to hide their activities online, is it really true. Last week, a wiretap report from 2015 surfaced on the United States Courts website that suggests Americans are using less encryption to hide their activities online but the report may not tell the whole story. […]

The EU has passed the new NIS directive that establishes minimum requirements for cyber-security on critical infrastructure operators. The European Parliament has passed the new network and information security (NIS) directive that establishes minimum requirements for cyber-security on critical infrastructure operators. The NIS directive has a significant impact on all the businesses that supply essential […]

The federal authorities have arrested the alleged mastermind behind KickassTorrents (KAT) and seized its domains, blocking its operations. According to the US Justice Department, the feds have arrested Artem Vaulin the alleged mastermind behind the BitTorrent distribution site KickassTorrents (KAT). The KickassTorrents website kat.cr is down worldwide and most of KAT domains (kickasstorrents.com, kickass.to, kat.ph, kastatic.com, thekat.tv, kat.cr, kickass.cr) […]

Interpol arrested the Nigerian mastermind of an online fraud network. He will face charges of hacking, conspiracy and obtaining money under false pretences. The Interpol announced the arrest of a 40-year-old Nigerian national that the mastermind behind an online fraud network which made illegal profits worth more than $60 million (54 million euros). The  Nigerian […]

Operation Pacifier is the massive hacking campaign against computers worldwide launched by the FBI in early 2015 to track criminals on the dark web. We are now aware that the FBI launched a massive hacking campaign against computers worldwide in early 2015 in the attempt to de-anonymize criminals visiting dark web child porn website The use of the NIT was […]

The Australian police had targeted the Love Zone child porn site, ran it for a while and managed to gain access at least to 30 US IPs. Apart from FBI, there are other organizations that have tried to identify the participants of child porn websites, so that they could get their hands on them and […]

KimDotcom’ Megaupload, the popular website seized by feds 5 years ago and currently managed by the FBI is serving adult content. Sometimes really bizarre things happen and it is difficult to explain them. Is it possible that the FBI hosts a porn website? The first thing that I have is that the FBI might run […]

Amidst of Apple vs. FBI debacle and successful attempt of a breach at NSA headquarters by a hacker group, a new torch has flamed internationally by France and Germany calling for a European Decryption Law. Months after the FBI-Apple encryption case standoff in the U.S. and NSA headquarters breach by hackers has started a global […]

The Dutch Police has seized two servers belonging to Switzerland-based Virtual Private Network (VPN) provider Perfect Privacy, as part of an investigation. Recently, two European countries, France and Germany, have declared war against encryption with an objective to force major technology companies to build encryption backdoors in their secure messaging services. The fight to the cybercrime is […]

The Europol processed 1 677 media content and social media accounts in six languages containing violent online terrorist propaganda. Recently the European law enforcement agency EUROPOL announced the constitution of a cyber unit focused on fighting the online terrorist propaganda. The Agency now announced to have processed 1677 media content and social media accounts in […]

The Payment Card Industry Security Standards Council (PCI Council) updates its standard to reduce fraudulent activities against PoS systems. The number of credit card frauds involving Point-of-Sale continues to increase, in the last months, numerous attacks targeted retails and hotels worldwide. The Payment Card Industry Security Standards Council (PCI Council) has responded with the definition […]

A researcher has demonstrated that the NAND mirroring technique was able to bypass the passcode retry limitations on the San Bernardino shooter’s iPhone. The battle between the FBI and Apple for unlocking an iPhone 5C belonging to the San Bernardino shooter went in the headlines in the first part of the year. Apple refused to unlock the device, the […]

The hacker Ardit Ferizi, aka Th3Dir3ctorY, who helped ISIS to share a Kill List of US Military Personnel has been sentenced to 20 years in a US prison Months ago, I reported you the story of Ardit Ferizi, aka Th3Dir3ctorY, who is the hacker that supported the ISIS organization by handing over data for 1,351 US […]

According to documents analyzed by The Bristol Cable media Agency, the UK authorities have purchased IMSI-catcher equipment. Privacy advocates and rights groups are in revolt against the UK law enforcement that has purchased mobile phone snooping technology. The rights groups are protesting against the adoption of the IMSI-catcher technology that could be used for dragnet surveillance. The IMSI-catcher is […]

The German Parliament passed a controversial surveillance law that seems to give more power to the BND intelligence agency. The German Parliament last week approved a controversial espionage law that theoretically will tighten oversight of the BND intelligence agency, but that according to privacy advocates will give more power to the authorities. The experts focused their […]

Security researchers have found vulnerabilities in the source code of the Mirai botnet and devised a method to hack back it. The Mirai botnet, this name is familiar to security experts due to the massive DDoS attack that it powered against the Dyn DNS service a few days ago. The Mirai malware was first spotted […]

The British Government announces an active defence posture in response to nation-state cyber attacks, Chancellor warns UK will retaliate against attacks. Hacking back, or “active defence” as security experts prefer to call it, is becoming a high debated argument. While the number of cyber attacks continues to increase and attackers are using even more sophisticated techniques, many Governments […]

Russia is going to ban Linkedin after a court ruling that found the professional social network  to be in violation of the country’s data protection laws. violation of the country’s data protection laws. On Thursday, a Moscow court has confirmed the decision to ban the professional social network LinkedIn in Russia. LinkedIn is violating the country’s data protection […]

The NIST Small Business Information Security: The Fundamentals guide aims to provide basic cybersecurity recommendations to small businesses. I have always stressed the necessity to improve cyber security posture for small businesses that are most exposed to threat actors across the world. Now the National Institute of Standards and Technology has released a cybersecurity guide to […]

In a massive crackdown, European police and law enforcement agencies worldwide seized more than 4,500 domains trading fake brands. The Europol conducted a massive crackdown against websites offering counterfeit products as part of the campaign dubbed “Don’t F***(AKE) Up.” The European law enforcement agency aims to halt the activity of online scammers who offer for sale […]

A zero-day exploit in the wild has been used by threat actors to de-anonymize Tor users by executing malicious code on Windows machines. The news is disconcerting and confirms the existence of a zero-day exploit in the wild that’s being used by threat actors to de-anonymize Tor users by executing malicious code on their machine. […]

Motherboard published an interesting blog post which includes further details on the cost of StingRay phone surveillance equipment. A couple of years ago I published a post on Stingray Technology trying to explain how governments track cellular devices. A StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by the Harris Corporation. At the time of the […]

The Europol announced a joint international operation targeting teenagers suspected to have used DDOS cyber attack tools. The Europan law enforcement agency Europol has announced that police from 13 countries across the world have arrested 34 users of DDoS attack tools and interviewed and warned 101 suspects. “From 5 to 9 December 2016, Europol and […]

FTC charges the Taiwanese IT giant D-Link putting consumers’ privacy at risk due to the failure of Implementing secure adequate measures for IoT devices. The U.S. Federal Trade Commission (FTC) has filed a lawsuit against the Taiwanese firm D-Link, over failure to secure its IoT products, including IP cameras and routers. The company has produced promotional […]

For the first time the England the Office for National Statistics (ONS) includes data related hacking and fraud, and findings are shocking. Cyber criminal activities in England and Wales have shown a spike in the last twelve months, Cyber frauds and computer misuse offences are most common crimes of this worrisome trend. According to the report “Crime in […]

According to Privacy groups, the FBI search warrant used to hack into thousands of computers around the world in the PlayPen case was unconstitutional, Privacy groups are claiming the FBI hacking campaign against the Playpen child pornography community violated international law. According to the court documents, the FBI monitored the Playpen bulletin board Tor hidden service […]

According to Privacy groups, the FBI search warrant used to hack into thousands of computers around the world in the PlayPen case was unconstitutional, Privacy groups are claiming the FBI hacking campaign against the Playpen child pornography community violated international law. According to the court documents, the FBI monitored the Playpen bulletin board Tor hidden service […]

Starting from June 1st search engine companies will block queries to links to pirated content, including films, TV shows, and copyright-protected content. It will be even more difficult to search for torrents of ExtraTorrent, KickassTorrents, The Pirate Bay and equivalent services. In the past copyright holders accused the search engine companies of doing too little to ban infringing […]

Starting from June 1st search engine companies will block queries to links to pirated content, including films, TV shows, and copyright-protected content. It will be even more difficult to search for torrents of ExtraTorrent, KickassTorrents, The Pirate Bay and equivalent services. In the past copyright holders accused the search engine companies of doing too little to ban infringing […]

The New York state announced that a set of cyber security regulations that will take effect on March 1st to tackle cyber threats. On Thursday, the New York state announced that a cyber security regulation will take effect on March 1st. The regulations will require financial institutions and insurers to meet minimum cyber security standards and […]

The New York state announced that a set of cyber security regulations that will take effect on March 1st to tackle cyber threats. On Thursday, the New York state announced that a cyber security regulation will take effect on March 1st. The regulations will require financial institutions and insurers to meet minimum cyber security standards and […]

The new UK Prisons and Courts Bill will let mobile networks to deploy IMSI catchers outside of prisons to snoop on mobile phone users. The Prisons and Courts Bill, introduced to Parliament last week, will let mobile networks to deploy IMSI catchers outside of prisons to snoop on mobile phone users. The IMSI catchers are surveillance equipment […]

Trolling, Doxing & Cyberstalking: Cybercrime & The Law. Cybercrime is one of the greatest threats facing US with implications for national security. According to the US Department of Justice (DOJ), “cybercrime is one of the greatest threats facing our country and has enormous implications for our national security, economic prosperity, and public safety. The range of […]

Trolling, Doxing & Cyberstalking: Cybercrime & The Law. Cybercrime is one of the greatest threats facing US with implications for national security. According to the US Department of Justice (DOJ), “cybercrime is one of the greatest threats facing our country and has enormous implications for our national security, economic prosperity, and public safety. The range of […]

The United States Federal Communications Commission (FCC)  announced the suspension of the privacy rules just before they came into effect. Someone considers the privacy the modern utopia, it is daily threatened by law enforcement and intelligence agencies and authoritarian regimes. Unfortunately, I have bad news for privacy defenders. On October 2016, the United States Federal […]

The United States Federal Communications Commission (FCC)  announced the suspension of the privacy rules just before they came into effect. Someone considers the privacy the modern utopia, it is daily threatened by law enforcement and intelligence agencies and authoritarian regimes. Unfortunately, I have bad news for privacy defenders. On October 2016, the United States Federal […]

British interior minister Amber Rudd believes encryption implemented by messaging services is offering a dangerous opportunity for terrorists to communicate. British interior minister Amber Rudd has a clear opinion on encryption implemented by many messaging services, it is no more acceptable. On Sunday the minister Amber Rudd reaffirmed that technology firms must collaborate with law enforcement agencies […]

US President Trump is extending by one year special powers introduced by President Obama with the Executive Order 13694 on cyber security. The US President Donald Trump intends to extend by one year the Executive Order 13694 that gives the US Governments special powers to issue sanctions against people and organizations engaged in significant cyberattacks and cybercrime against […]

Presented the voluntary, non-binding norms of State behavior during peacetime in the G7 DECLARATION ON RESPONSIBLE STATES BEHAVIOR IN CYBERSPACE. The risk of escalation and retaliation in cyberspace, the increasing number of cyber attacks and cyber threats even more sophisticated could have a destabilizing effect on international peace and security. The risk of conflict between states […]

Presented the voluntary, non-binding norms of State behavior during peacetime in the G7 DECLARATION ON RESPONSIBLE STATES BEHAVIOR IN CYBERSPACE. The risk of escalation and retaliation in cyberspace, the increasing number of cyber attacks and cyber threats even more sophisticated could have a destabilizing effect on international peace and security. The risk of conflict between states […]

Presented the voluntary, non-binding norms of State behavior during peacetime in the G7 DECLARATION ON RESPONSIBLE STATES BEHAVIOR IN CYBERSPACE. The risk of escalation and retaliation in cyberspace, the increasing number of cyber attacks and cyber threats even more sophisticated could have a destabilizing effect on international peace and security. The risk of conflict between states […]

The implementation of the NIST CyberSecurity Framework is of vital importance for the changes taking place in the landscape of zero-day threats The NIST CyberSecurity Framework is a guide for businesses and enterprises of good practices for information security. The NIST CyberSecurity Framework proposes a guide, which can adapt to each enterprise e for different […]

As Australia’s newly approved Data Retention law comes into effect, how does the law actually affect the average coutry internet user? As Australia’s newly approved Data Retention law comes into effect, internet users across the country are frantically searching for a way to dodge government surveillance and ISP tracking. But how does the law actually […]

Commenting the London Bridge terror attack, Prime Minister says there is ‘far too much tolerance of extremism’ in the UK and urges Internet regulation. The London Bridge terror attack is fueling the debate about the Internet regulation, the Prime Minister Theresa May believe the terrorists had ‘safe spaces’ online and this is no more acceptable. Prime […]

Commenting the London Bridge terror attack, Prime Minister says there is ‘far too much tolerance of extremism’ in the UK and urges Internet regulation. The London Bridge terror attack is fueling the debate about the Internet regulation, the Prime Minister Theresa May believe the terrorists had ‘safe spaces’ online and this is no more acceptable. Prime […]

Is the hack back legal? There is a heated debate about the concept of active defense. What about the Active Cyber Defense Certainty (ACDC) Act? In a time where attribution of cyber crimes is all but impossible, the idea of allowing companies to ‘hack back‘ at their attackers seems far-fetched. However, Tom Graves (R-GA) has […]

The FBI hacked the system of a dark web user who tried to purchase a mail bomb from an undercover investigator in the US. According to a plea agreement, filed on April 28, 2017, Clinton Scott Bass of Georgia (US) tried in a first time to purchase a car bomb. The man, who was using […]

Telegram agrees to register with Russia authorities to avoid the local ban, but the battle is still ongoing because it won’t share user data. The Russian Government threatened to ban Telegram because it refused to comply data protection laws. “There is one demand, and it is simple: to fill in a form with information on […]

Russia is going to tighten controls on web services, on Friday, the parliament voted to prohibit web tools that could be used to surf outlawed websites. Recently Russian authorities threatened to ban to ban Telegram because it refused to comply data protection laws. On Friday, the Russia’s parliament voted to ban web tools that could be used by […]

According to the UK’s Department for International Trade, the country granted a license to export surveillance equipment to Turkey earlier this year. The UK continues to be one of the most active countries involved in the trade of surveillance technology. British firms continue to export surveillance systems ranging from internet mass surveillance equipment to-catchers. According to the […]

In compliance with Chinese Internet monitoring law, Apple has started removing all IOS VPN apps from it App Store in China. The company complies with a request from the Chinese Government that wants to strict censorship making it harder for netizens to bypass the Great Firewall system (aka Golden Shield project). The Golden Shield project […]

According to the Chinese Cyber Security law, the information obtained by the CNNVD could be used in intelligence operations. The new Chinese cyber security law will allow the Government to analyze the source code and any intellectual property of foreign tech companies working in the country. The Chinese cyber security law was focused on the protection of Chinese users’ […]

The Spanish Data Protection Agency (AEPD) has issued a €1.2 Million fine against Facebook for violating data protection regulations. Other privacy problems for the tech giant Facebook, the company has been fined for a series of privacy violations in Spain. The Spanish Data Protection Agency (AEPD) has issued a €1.2 Million fine against Facebook for violating data protection regulations. According […]

The Spanish Data Protection Agency (AEPD) has issued a €1.2 Million fine against Facebook for violating data protection regulations. Other privacy problems for the tech giant Facebook, the company has been fined for a series of privacy violations in Spain. The Spanish Data Protection Agency (AEPD) has issued a €1.2 Million fine against Facebook for violating data protection regulations. According […]

The popular instant messaging application WhatsApp has been widely blocked in mainland China by the Government broadening online censorship. Bad news for the Chinese users of the popular instant messaging app WhatsApp because the application has been widely blocked in mainland China by the Government. Users are not able to send text messages, photo and video sharing. It isn’t […]

China continues to strengthen its online censorship, it has shut down or revoked the licenses of 13,000 websites since 2015 for violating the country’s internet rules. State media also reported that service providers have closed nearly 10 million internet accounts for “violating service protocol.” “These moves have a powerful deterrent effect,” Xinhua quoted Wang Shengjun, vice […]

Aiming to tackle threats from rogue nations and hackers The UK Government urges to boost security measures of services in critical sectors. On November 2016 United Kingdom published the National Cyber Security Strategy to address cyber threats from rogue nations like Iran, Russia, China, terrorists, states sponsored hackers and cyber menaces like ransomware against the […]

Aiming to tackle threats from rogue nations and hackers The UK Government urges to boost security measures of services in critical sectors. On November 2016 United Kingdom published the National Cyber Security Strategy to address cyber threats from rogue nations like Iran, Russia, China, terrorists, states sponsored hackers and cyber menaces like ransomware against the […]

A Supreme Court in Russia ruled Telegram must provide the FSB with encryption keys to access users’ messaging data to avoid being blocked. Bad news for Telegram, a Supreme Court in Russia ruled the company must provide the FSB with encryption keys to access users’ messaging data. If Telegram will refuse to comply the request the authorities […]

A Supreme Court in Russia ruled Telegram must provide the FSB with encryption keys to access users’ messaging data to avoid being blocked. Bad news for Telegram, a Supreme Court in Russia ruled the company must provide the FSB with encryption keys to access users’ messaging data. If Telegram will refuse to comply the request the authorities […]

The US Department of State wants to ask visa applicants to provide details on the social media accounts they’ve managed in the past five years. The US Government wants to make it mandatory for all foreigners (immigrant /non-immigrant) to provide social media details, telephone numbers, email addresses, and international travel during this period. when applying for […]

Airbnb China announced that it will share user data belonging to Chinese users with the Government to comply with national laws and regulations. Airbnb announced that it will share user data belonging to Chinese users with the Government. The company is notifying the Chinese users it will share guest’s information with local authorities to comply […]

Home Wi-Fi networks in the UK using Super Router provided by TalkTalk ISP are affected by a vulnerability that exposes them to cyber attacks. Security researchers at software house IndigoFuzz have discovered a security flaw in the implementation of the WPS feature of the TalkTalk Super Router that can be exploited to compromise to steal […]

The Justice Department announced an effort to disrupt the VPNFilter botnet of hundreds of thousands of infected home and office (SOHO) routers and other networked devices under the control of a Russia-linked APT group. Yesterday Talos and other security firm revealed the discovery of a huge botnet tracked as VPNFilter composed of more than 500,000 compromised routers and […]

Reality Winner, a former NSA contractor who leaked classified documents to the press in 2017, has been released from prison to home confinement. Reality Winner is a former NSA intelligence contractor who leaked a classified hacking report to the press in 2017. The FBI arrested Reality Leigh Winner on 3rd June for leaking classified information to […]