Who doesn’t want to buy a fully equipped FBI surveillance van having facilities like video and audio recording equipment and even a...
In January this year, a dangerous surveillance malware was found targeting Mac and Linux devices – The malware was discovered by Thomas...
WikiLeaks Revealed CIA Surveillance Projects Documents “UMBRAGE Component Library(UCL)” from CIA contractor Raytheon Blackbird Technologies which contains five secret Malware Development Related...
Cameradar hacks its way into RTSP CCTV cameras Cameradar allows you to: Detect open RTSP hosts on any accessible target Get their...
If surveillance, cybersecurity, and privacy are things you think about a lot, you should find The Circle interesting viewing.
NSA announces a change in its surveillance activities, it will no longer spy on citizens’ emails, texts, and other Internet communications. It is...
The Callisto APT Group borrowed the source code leaked by hackers that broke into Hacking Team network. According to F-Secure Labs, The Callisto APT...
Nothing to fear, citizens. Keep consuming. Keep smiling. WikiLeaks has dumped online what appears to be a trove of CIA documents outlining...
The government of Thailand has been under the hammer of internet activist groups since the parliament approved an amendment to the 2007...
Sony has released firmware updates that remove a remotely exploitable backdoor account from 80 models of IP and security cameras. Because attackers...
The Internet of Things has become more of a joke lately because of the never ending styles of exploitation that these poor...
AT&T has been data-mining and willingly sharing user phone data, through its “Hemisphere” Project, which is essentially a mass surveillance program. The...
Short Bytes: The government security agencies try to intercept information about people on the internet. The agency takes the help of companies...
Short Bytes: The ACLU of California has released some records that show Twitter, Facebook, and Instagram shared the user data with a...
Tor is an imperfect privacy platform. Ars meets the researchers trying to replace it. Since Edward Snowden stepped into the limelight from a hotel room...
Security researcher finds malicious code embedded within cameras offered for sale on Amazon. Last week, independent security researcher Mike Olsen discovered that CCTV...
In 2013 the FBI agents seized TorMail, now new information are emerging on the operations. Someone believes it was a surgical ops...
Privacy protection or criminal activity prevention? UK Government faces battle against tech companies on a hot matter UK Government drafted a plan...
The U.S. Department of Homeland Security and local law enforcement confirmed that Drug Traffickers are hacking surveillance drones on the border. Small...
In a world where government surveillance is a big thing there is a need for tools countering the whole idea of keeping...
Newly disclosed documents show that the NSA had found a way to continue spying on American citizens’ email traffic from overseas. The...