Big Data Role in Intelligence Missions
The operational world that interests governments the most nowadays is the intelligence world. Unlike the “national/military” intelligence of the past, the current intelligence realm...
Will Information Sharing Among Intelligence Agencies Risk Privacy?
In its final days, the Obama administration has expanded the power of the National Security Agency (N.S.A.) to share globally intercepted personal communications with...
NSA Wants To Monitor Your Pacemaker
The NSA wants to monitor and collection information from pacemakers and other biomedical devices for national security purposes, The Verge reports. The idea, it...
NSA Didn’t Crack The San Bernardino iPhone – Here’s Why
Is there anything the US National Security Agency can’t do? It can tap undersea fibre optic cables in real time, track the locations of...
Former USAG: Snowden Performed A “Public Service”
Edward Snowden, the infamous NSA whistleblower, has found an unlikely supporter in former US Attorney General Eric Holder, who has said that Snowden performed...
Harvard: US Can’t Ban Encryption
US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study.
Despite over two years’ efforts by the...
The NSA To Undergo Major Reorganisation For The 21st Century
The US National Security Agency (NSA) is about to undergo a major reorganisation, according to past and current agency officials. The world’s largest electronic...
Snowden Casts Doubt On ISIS Encryption Video
ISIS likes to tout itself as extremely technologically proficient. The organisation releases apps, instructions on online behaviour, and has recently released a video showing...
MIT Invents A Messaging System More Anonymous Than Tor
Researchers at the Computer Science and Artificial Intelligence Laboratory (CSAIL) at the Massachusetts Institute of Technology (MIT) have developed a new online text messaging...
China To Build Spy-proof Smartphones
For years digital security experts have worried over possible backdoors implemented into equipment manufactured at Chinese factories. Over the years there have been several...
Cyber Wars? Not So Fast
Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...
Who Is Tracking Your Phone?
It is now widely known that governments the world over eavesdrop on citizens’ electronic communication. Until last year, governmental spying was thought to be...
Government Data Requests From Facebook At All-Time High
Facebook has released its biannual report on government data requests, indicating that total law enforcement requests are at their highest level ever at 41,214...
DoD Wants IoT Standards
A standardisation of common protocols and interconnections is required if the US Department of Defense (DoD) is to take advantage of the Internet of...
Germany Tightens The Reins On Spy Service
The US National Security Agency (NSA) overstepped an intelligence-sharing agreement with Germany by requesting German technicians to snoop on allied governments‘ emails, a top-level...
Cyber Wars: From Regional Nuisance to Global Threats
Today’s small wars and border conflicts are being fought online and under the radar, but the conflicts could escalate into real world wars.
Last year,...
The Big Brother Features a British Accent
The right for privacy or the general interest to safeguard the public's privacy – which one wins in case of a clash? After failing...
NSA will Track Your Smartphone Finger Strokes
Smartphone technology built by Lockheed Martin promises to verify a user's identity based on the swiftness and shape of the individual’s finger strokes on...
US cities vying to become nation’s cyber hub
The need for cybersecurity solutions and experts is going to grow as more companies such as Sony Pictures, Target, Home Depot, and Chase are...
The private account of a movie star has been hacked –...
By: Gad Elkin, Cyber Security Manager at EMEA
It seems more and more people are interested in securing their personal computers and private information. The...
Is Canada a cyber-superpower?
The secret hacking tactics of Canada’s intelligence agency
Canada’s electronic surveillance agency has secretly developed an arsenal of cyber weapons capable of stealing data and...
NSA Surveillance Software Infecting Thousands of Computers Worldwide
A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...