A Brazilian judge ordered to block access to the WhatsApp messaging service for 72 hours, it is the second time in five months. Brazilian authorities ordered ISPs to block WhatsApp today in a dispute over access to encrypted data. The order to block the messaging service for 72 hours has been issued by a judge from the […]
The European Parliamentâs civil liberties committee has approved new governance rules that give Europol new cyber powers to tackle down terrorists online. The Europol, the European Police Agency, gets new cyber powers to fight against terrorists online. The European Parliamentâs civil liberties committee has approved new governance rules by a massive majority. The fight against […]
According to a Justice Department memo, the FISA ACT Court approved each and every request made by the government in 2015. According to a Justice Department memo, the United States Foreign Intelligence Surveillance Act (FISA) Court approved each and every request made by the government in 2015. All of the 1,457 requests made last year […]
Doubts about a couple of draft anti car hacking laws, they could create serious problems with innocent drivers and cyber security experts. Car hacking is a scaring reality, modern vehicles use a huge quantity of connected components that could be easily compromised knowing the communication protocol used by principal vendors. The interest in car hacking gained […]
Employee monitoring is a complex and controversial topic that can often become the source of discontent between employers and their staff. It is not a secret that most employees have a negative opinion about modern monitoring practices, such as PC monitoring. It is often viewed as an invasion of privacy and employer overstepping their authority. […]
The US Supreme Court has approved amendments to Rule 41 that allows judges issue search warrants for hack into computers located worldwide. The US Supreme Court has approved amendments to Rule 41, which now let U.S. judges issue search warrants for hacking into computers located also outside their jurisdiction. Under the original Rule 41, a […]
Matt Edman is the security expert and former employee of the Tor Project that helped the FBI to hack and de-anonymize Tor users developing the Torsploit. Matt Edman is the cyber security expert and former employee of the Tor Project that helped the FBIÂ to hack and de-anonymize Tor users in several court cases, including the […]
The Dutch police in an international effort with Canadian authorities seized the Ennetcom encrypted communication network used by 19,000 users. Another success of the Dutch law enforcement against the cybercrime. The police arrested the owner of Ennetcom, a provider of encrypted communications with more than 19,000 customers. Prosecutors suspect he was using the business to manage […]
Investigators discovered that the hackers managed to gain access to the Bangladesh Bank network because it was using second-hand switches and no firewall. In  March, unknown hackers have stolen more than $100 million from the Bangladesh Bank account at the US Federal Reserve Bank. Now new disconcerting news regarding the Bangladesh bank is in the headlines. According […]
FBI Director Comey explained at the Aspen Security Forum in London that the Agency paid more than $1.3 million to break into San Bernardino shooter’s iPhone. FBI Director Comey explained at the Aspen Security Forum in London that the Agency paid more than $1.3 million to break into San Bernardino shooter’s iPhone The FBI vs […]