Russia is going to ban Linkedin after a court ruling that found the professional social network  to be in violation of the country’s data protection laws. violation of the country’s data protection laws. On Thursday, a Moscow court has confirmed the decision to ban the professional social network LinkedIn in Russia. LinkedIn is violating the country’s data protection […]
Earlier this week, Donald Trump won a stunning election victory that will put him in charge of the worldâs most powerful mass surveillance infrastructure. Regardless of which side of the political spectrum you are on, Trumpâs control over the NSA is now an indisputable fact, and we think it is worth taking a closer look […]
AT&T has been data-mining and willingly sharing user phone data, through its âHemisphereâ Project, which is essentially a mass surveillance program. The NSA may be the well-known governmental entity notorious for conducting spy surveillance of its citizens and its massive record retention program, but the private sector is also capitalizing on such opportunities. AT&T, a […]
A group of security experts discovered that the Microsoft Skype Messaging service exposes user keystrokes during a conversation. A group of researchers from the University of California Irvine (UCI) and two Italian Universities discovered that the popular Skype Messaging service expose user keystrokes during a call. The researchers have devised a method to record the acoustic emanations of […]
The WiFox mobile app was designed as a huge container of network names and passwords for Wi-Fi airports networks worldwide. Do you travel a lot? Probably you have already read about WiFox, it is a legitimate Android/iOS mobile app that includes indications of thousands of airport Wi-Fi networks and their passwords. We have spoken several times about the […]
Why Signal is considered the most secure instant messaging app? It stores only a few information about its users, and the events demonstrate it. Despite many of the most popular apps are implementing end-to-end encryption, not all applications are equal. Security experts recommend Signal for secure communications, in the aftermath of the DNC hack the staffers […]
Researchers devised two correlation attacks, dubbed DefecTor, to deanonymize Tor users using also data from observation of DNS traffic from Tor exit relays. Law enforcement and intelligence agencies dedicate an important commitment in the fight of illegal activities in the Dark Web where threat actors operate in a condition of pseudo-anonymity. A group of security researchers at […]
Every time you type a number to start an iMessage conversation on your iPhone, Apple logs your message contacts and other metadata. In January 2015, experts claimed that Apple is not able to read messages sent between devices through iMessages, but reported that the company but it is still able to access data in the backups. […]
From January 2017, Chrome will indicate connection security with an icon in the address bar labeling HTTP connections to sites as non-secure. Google continues its effort to make the web a better place by pushing the adoption of encryption, we left the IT giant in May when it announced the decision to switch on default HTTPS […]
The rise of the Internet of Things is being heralded by many as the beginning of a new Industrial Revolution. Technology firms are now linking objects ranging from household appliances to industrial machinery to the internet. With telecommunications firms on board, manufacturers are coming up with new, innovative uses for everyday objects. Yet linking these […]