The United States Federal Communications Commission (FCC) Â announced the suspension of the privacy rules just before they came into effect. Someone considers the privacy the modern utopia, it is daily threatened by law enforcement and intelligence agencies and authoritarian regimes. Unfortunately, I have bad news for privacy defenders. On October 2016, the United States Federal […]
Trolling, Doxing & Cyberstalking: Cybercrime & The Law. Cybercrime is one of the greatest threats facing US with implications for national security. According to the US Department of Justice (DOJ), âcybercrime is one of the greatest threats facing our country and has enormous implications for our national security, economic prosperity, and public safety. The range of […]
The researcher East-Ee Security devised a proof of concept bypass of the Googleâs reCaptcha V2 verification system dubbed ReBreakCaptcha. East-Ee Security proposed a proof of concept bypass of the Googleâs reCaptcha V2 verification system dubbed ReBreakCaptcha. The PoC uses the Google web-based tools for its purpose. According to the author, ReBreakCaptcha âlets you easily bypass […]
Dark net webmail provider For the third consecutive week, the popular Tor web email service SIGAINT is unavailable and the real cause is a mystery. SIGAINT is one of the largest web email services on the TOR network that is used to send messages preserving the user’s anonymity. For the third consecutive week, the popular email service is unavailable […]
Google has now announced that E2EMail is no more a Google product, instead, it has become a âfully community-driven open source project.â The End-to-End crypto library is a core component of several projects of the IT giant such as the E2EMail, a Chrome app that runs independent of the normal Gmail web interface and allows non-technical users to […]
The new UK Prisons and Courts Bill will let mobile networks to deploy IMSI catchers outside of prisons to snoop on mobile phone users. The Prisons and Courts Bill, introduced to Parliament last week, will let mobile networks to deploy IMSI catchers outside of prisons to snoop on mobile phone users. The IMSI catchers are surveillance equipment […]
Cloudflare was leaking a wide range of sensitive information, including authentication cookies and login credentials, the flaw was dubbed Cloudbleed. The notorious Google security researcher, Tavis Ormandy, recently made and astonishing discovery, Cloudflare was leaking a wide range of sensitive information, including authentication cookies and login credentials, the flaw was dubbed Cloudbleed. “On February 17th 2017, […]
German regulators have banned ‘My Friend Cayla,’ an internet-connected doll that can chat with our children, it can be abused for surveillance activities. German regulators have banned ‘My Friend Cayla,’ an internet-connected doll that can chat with our children. The authorities believe the device is a “spying device”. The Federal Network Agency is inviting parents to […]
Signal, the most secure instant messaging app, introduced the Video call feature in public beta release. You can test is now! Signal is considered the most secure instant messaging app, searching for it on the Internet it is possible to read the Edward Snowdenâ testimony: âUse anything by Open Whisper Systemsâ Snowden says. The Cryptographer and […]
According to the Russian forensic firm Elcomsoft the Apple iCloud saved deleted Safari browsing history over the years open the door to surveillance. According to digital forensics firm Elcomsof, Apple iCloud maintained deleted internet Safari browsing history over the years. The experts at Elcomsof discovered the issue while trying to extract records from iCloud accounts, they were able to retrieve supposedly deleted Safari browser […]