A former reality TV star was able to sneak in her smartphone and record secret conversations in the Situation Room, supposedly the most secure place in the White House.
Al Jazeera went undercover, approaching three companies on behalf of the governments of Iran and South Sudan – and found it all too easy to buy surveillance technology that could be used to spy on the countries’ citizens.
According to media reports, the White House is trying to crack down on staff leaking information to the media. But will random phone checks be enough to help weed out the leakers?
Officials found 123 of 187 network video recorders capturing CCTV footage had fallen victim to two strains of ransomware.
David Bisson reports.
For more than 17 years British security and intelligence agencies broke the law, illegally collecting vast amounts of data about UK citizens without proper oversight.
The so-called ‘Snooper’s Charter’ is being rushed through the UK Parliament.
Guest contributor Philip Le Riche takes a closer look.
The truth is that “smart” devices have the potential to be very, very dumb when it comes to security.
And that’s something intelligence agencies are interesting in exploiting…
Read more in my article on the Hot for Security blog.
According to a former NSA officer, bulk data collection by intelligence agencies has resulted in the loss of life before, and it will lead to more lives lost in the future.
David Bisson reports.
BlackBerry and its rivals couldn’t be further apart it seems, telling federal conference delegates that the company is a strong believer in providing law enforcement agencies with methods to lawfully intercept communications.
Read more in my article on the Bitdefender Business Insights blog.
The controversial draft Investigatory Powers Bill being proposed by the UK government says almost nothing about encryption.
Guest contributor Philip Le Riche shares his opinion about what it does have to say, and whether he feels the bill is needed.
Can Hacking Team recover from being breached so badly?
Time will tell. But in the meantime, they’re advising law enforcement and government customers to stop using their spyware.
Source code, internal documents and email archives are released by hackers following hack of one of the “Enemies of the internet.”
Do you work at GCHQ? (The UK surveillance agency, not the newsletter)
UK government report reveals that internal monitoring of GCHQ staff captured more information about employees’ communications than was authorised.
Eris Industries says it simply cannot engage in business if it is forced to incorporate cryptographic backdoors that can be accessed by MI5 and GCHQ.
Good news, you won’t get into trouble if you hack on behalf of GCHQ under sneaked-in change to legislation.
Bad news, the pay is rubbish.
Once again, the perils of modern society where the majority of us are willingly carrying an electronic spy in our pocket are highlighted.