CyberTechTips

782 bookmarks
Custom sorting
‘Illegal Spying Below’ blimp flies above NSA data center
‘Illegal Spying Below’ blimp flies above NSA data center
Anti-surveillance activists flew a blimp above the National Security Agency’s massive, $1.5 billion data center in Bluffdale, Utah on Friday as an act of protest against the NSA’s contentious collection of vast amounts of the world’s digital data.
·rt.com·
‘Illegal Spying Below’ blimp flies above NSA data center
More on Hacking Team's Government Spying Software
More on Hacking Team's Government Spying Software
Hacking Team is an Italian malware company that sells exploit tools to governments. Both Kaspersky Lab and Citizen Lab have published detailed reports on its capabilities against Android, iOS, Windows Mobile, and BlackBerry smart phones. They allow, for example, for covert collection of emails, text messages, call history and address books, and they can be used to log keystrokes and obtain search history data. They can take screenshots, record audio from the phones to monitor calls or ambient conversations, hijack the phone’s camera to snap pictures or piggyback on the phone’s GPS system to monitor the user’s location. The Android version can also enable the phone’s Wi-Fi function to siphon data from the phone wirelessly instead of using the cell network to transmit it. The latter would incur data charges and raise the phone owner’s suspicion...
·schneier.com·
More on Hacking Team's Government Spying Software
Pepper Spray Drones
Pepper Spray Drones
Coming soon to a protest near you: drones that fire pepper spray bullets. Desert Wolf’s website states that its Skunk octacopter drone is fitted with four high-capacity paintball barrels, each capable of firing up to 20 bullets per second. In addition to pepper-spray ammunition, the firm says it can also be armed with dye-marker balls and solid plastic balls. The machine can carry up to 4,000 bullets at a time as well as “blinding lasers” and on-board speakers that can communicate warnings to a crowd.
·schneier.com·
Pepper Spray Drones
EFF and 31 Other Organizations Call for Privacy Assessment of FBI's Biometr
EFF and 31 Other Organizations Call for Privacy Assessment of FBI's Biometr
The FBI plans to roll out the face recognition component of its massive Next Generation Identification (NGI) biometrics database this summer—but the Bureau has six years of catching up to do in explaining to Americans exactly how it plans to collect, use and protect this data.  Today we called on...
·eff.org·
EFF and 31 Other Organizations Call for Privacy Assessment of FBI's Biometr
Where Are Your Encryption Keys?
Where Are Your Encryption Keys?
Businesses that do not encrypt their information risk losing it. Legal professionals risk private and confidential client information when they do not take steps to secure it properly. Your operating system has encryption built in, through Windows Bitlocker or Mac File Vault II. If you are one of those lawyers on an older version of […]
·slaw.ca·
Where Are Your Encryption Keys?
Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones
Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones
Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones. The modules, made by the Italian company Hacking Team, were uncovered by researchers working independently \[…\]
·wired.com·
Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones
Snowden gets German Fritz Bauer award for exposing US intelligence
Snowden gets German Fritz Bauer award for exposing US intelligence
​Former US intelligence contractor Edward Snowden has been awarded the Fritz Bauer Prize of the German Humanist Union, a prominent civil rights organization, for exposing the controversial surveillance practices of the NSA and its accomplices.
·rt.com·
Snowden gets German Fritz Bauer award for exposing US intelligence
You can’t spell “cryptography” without a “why”
You can’t spell “cryptography” without a “why”
When considering adding cryptography to an embedded system (or any other information system) manufacturers always ask: “Why do I need cryptography?” That is, unless they have already been burned by…
·atmelcorporation.wordpress.com·
You can’t spell “cryptography” without a “why”
Who Doesn’t Want to Close the E-Mail Privacy Loophole?
Who Doesn’t Want to Close the E-Mail Privacy Loophole?
Bloomberg Businessweek helps global leaders stay ahead with insights and in-depth analysis on the people, companies, events, and trends shaping today's complex, global economy
·businessweek.com·
Who Doesn’t Want to Close the E-Mail Privacy Loophole?
Companies warned of major security flaw in Google Play apps
Companies warned of major security flaw in Google Play apps
University researchers have found that developers often store authentication keys in the Android apps on Google Play, making it possible for criminals to steal corporate or personal data.
·csoonline.com·
Companies warned of major security flaw in Google Play apps
Feds Asked Cops to Deceive Courts About Use of Spy Tool, Emails Show
Feds Asked Cops to Deceive Courts About Use of Spy Tool, Emails Show
Police in Florida have been deliberately deceiving judges and defendants about their use of a controversial surveillance tool known as a stingray at the request of the U.S. Marshal's Service, according to newly obtained emails.
·wired.com·
Feds Asked Cops to Deceive Courts About Use of Spy Tool, Emails Show
SFTP Simplified
SFTP Simplified
A simplified introduction to SFTP. What it does. Why it's better than FTP. How it transfers files securely. How to use it.
·jscape.com·
SFTP Simplified