The Russian government retaliated against Telegram messaging app by filing a lawsuit to stop or limit access to the app in that country after the company refused a request by the government to turn over its encryption keys to the FSB.
What is needed for online use analysis in safeguarding is context, and it's here that big data analytics and machine learning can help educators correlate activity with what we might know about the individuals engaging in it.
The Hacking Team is back: previously unreported samples of its infamous surveillance tool, the Remote Control System (RCS), were spotted in the wild throughout fourteen countries, according to ESET researchers.
US Attorney General Jeff Sessions' decision to charge the US Justice Department inspector general with investigating the FBI's alleged abuse of its surveillance authority met with sharp criticism from US president Trump.
The Court of Appeal has found the UK's Data Retention and Investigatory Powers Act 2014, known as the Snoopers' Charter, unlawful as far as the prevention, investigation, detection and prosecution of serious crimes are concerned.
A heatmap of two years' worth of fitness tracker Strava's global data, released last November but discovered more recently by an Australian student, inadvertently revealed the location of US military facilities in war zones.
The elusive FinFisher spyware, which is used widely in covert surveillance campaigns, especially by oppressive nations against political opposition, could soon be cracked, researchers believe.
A letter written on behalf of a former Uber employee contains allegations that the transportation company illegally hacked and surveilled its competitors.
'An individual has no reasonable expectation of privacy in information voluntarily disclosed' is the premise being taken to the US Supreme Court Wednesday, to clarify if law enforcement must obtain warrants to access wireless data
Developers leave API credentials in applications built on Twilio telephony platform allowing phone call eavesdropping.
Is the ability to effectively bypass monitoring middleboxes is a good thing, both for the enterprise and more broadly network security?
The FBI hasn't yet broken the phone belonging to a gunman who went on a shooting rampage in a Texas church, killing 26 and wounding 24.
Statisticians at the Office for National Statistics (ONS) have been tracking the movements of thousands of people, albeit anonymised, in an experiment' with Vodaphone that could replace census questions in England and Wales.
Dutch moves to strengthen the powers of its state authorities leads Mozilla to propose excluding Dutch CAs from its trust list - could form part of a wider undermining of trust in the Internet
A new Adobe Flash zero day exploit has been identified, reportedly used in an attack on 10 October by a threat actor known as BlackOasis and delivered through a Microsoft Word document to deploy the FinSpy commercial spyware.
Avast continued to reveal further details surrounding the cyberattack that placed a backdoor in its free computer maintenance app, CCleaner. Attack believed originated from a country located in the UTC + 4 or UTC + 5 time zones.
Commercial multi-user gateways may only be licensed where the supplier can demonstrate that callers can be identified following Security Minister direction to Ofcom to ensure government access to information.
Unnamed major internet providers are reported to be the distribution route for the spread of a new variant of government spyware FinFisher (also known as FinSpy) in two countries, targeting people seeking privacy.
Researchers have demonstrated a way for remote attackers to exfiltrate data from and send malicious commands to air-gapped networks, using infrared surveillance cameras.
WhatsApp apparently refused the UK government's entreaties to build what would essentially be a backdoor into its app earlier this year.
A free mobile anti-virus app developed by the DU group, a developer of Android apps, has been found to collect user data without the device owners' consent.
A catastrophic worldwide cyber-attack, the emergence of an IoT-enabled surveillance state, and the weakening of encryption were among the chief security and privacy fears expressed by experts.
Organisations will have to ask permission first before being allowed to conduct electronic monitoring of staff.
A Texas federal judge last week ruled in favour of the US Department of Justice, rejecting a motion to suppress evidence obtained in the course of the investigation using FBI malware.
Major League Baseball investigators in the US have found that the Boston Red Sox used Apple watches to steal hand signals from competitors' catchers and pass them on to their own players.
In addition to intrusion detection and surveillance hardware, technology decision-makers within major cities must consider additional technologies to ensure the hardware and tools themselves are protected says Maya Canetti.
A previously undocumented backdoor program used to spy on foreign embassies and consulates appears to be the work of suspected Russian APT group Turla.
Mobile users who substitute their damaged phone touchscreens or other hardware components with third-party replacements could be infecting their phones with malicious components.
CovertBand uses high-frequency audio to place people in a room and track a person's movements using the speakers and microphones that are found in many smartphones, laptops and other devices.