Search

Showing 67 results for: "Edward+Snowden+leaks".

Five Eyes agencies offer security advice for small businesses
Five of the most prominent intelligence agencies in the world are teaming up to help small businesses (SMBs) become more secure. The United States intelligence community, along with its counterparts in the UK, Canada, Australia and New Zealand (collectively known as the Five Eyes) issued a set o...
Human rights organisations declare EU-US privacy shield invalid
Two leading human rights organisations have called for an end to EU - US Privacy Shield, saying that US surveillance practices render it invalid. Amnesty International and Human Rights Watch addressed the European Commission in a letter on 26 July. According to the groups, “the United States of Amer...
DoD faults NSA for lax security implementations, Sophos report
A number of initiatives to strengthen security were mandated at the National Security Agency (NSA) following the leaks by Edward Snowden of 1.5 million documents, but implementation of those procedures lacked teeth, according to a report by the Department of Defense (DoD).The 61-page report from the...
Quantum-powered random numbers could provide key to better cryptography
Usually when the subject of quantum computing comes up, it's all rather future-gazing stuff. However, during the Infosecurity Europe 2017 show, one company launched a quantum technology derived product that's very much here and now: Entropy-as-a-Service.Whitewood, which is developing crypto-security...
Sensitive DoD files found on unsecured Amazon server
A researcher discovered sensitive U.S. military files on an unsecured Amazon Web Services storage server earlier this month, once again exposing the carelessness federal agencies and their partners have at times exhibited when managing data.Cybersecurity company UpGuard revealed the troubl...
Cybercriminals reap the benefits of cross-community collaboration
A new report from Flashpoint shows the evolutions of the criminals' communication strategies, tactics and tools. The research found that cyber-criminals are highly collaborative, much more so than the organisations they are targeting.The study tracked the communication strategies and preferences of ...
The big ask: Government requests
What issues should companies be considering when it comes to handing over privileged information? Karen Epper Hoffman investigates.The issue of how much access a government is and should be allowed to its people's private electronic information is perhaps the biggest privacy issue of current times. ...
CyberUK 2017: GCHQ director explains NCSC ethos in parting interview
Robert Hannigan (left) and Lionel Barber at the NCSC's CyberUK 2017 eventRobert Hannigan, the outgoing head of GCHQ, spoke today about the formation of the NCSC and the role that it will play in combating cyber-crime and terrorism in the UK.He was being interviewed live, on stage, by Financial Times...
WikiLeaks releases document trove allegedly containing CIA hacking tools
WikiLeaks has released the CIA's "Year Zero," a trove of 8,761 documents and files allegedly from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Va.According to a WikiLeaks press release and analysis, the leaked documents were selected from an ...

You can skip this ad in 5 seconds