Skip to main content

Home/ ITGSonline/ Group items tagged security politics and government

Rss Feed Group items tagged

dr tech

UK cops are secretly harvesting all data from the phones and cloud accounts of suspects... - 0 views

  •  
    "Many services retain the data they harvest indefinitely, and some have been caught storing (and losing) the data without encryption: for example, in 2017 the Greater Manchester Police were found to have lost data from victims of violent and sexual crimes, which had been stored unencrypted on DVDs and sent through the post."
dr tech

DARPA Is Building a $10 Million, Open Source, Secure Voting System - Motherboard - 0 views

  •  
    "Now they might finally get this thanks to a new $10 million contract the Defense Department's Defense Advanced Research Projects Agency (DARPA) has launched to design and build a secure voting system that it hopes will be impervious to hacking."
dr tech

A critical flaw in Switzerland's e-voting system is a microcosm of everything wrong wit... - 0 views

  •  
    ""We have only examined a tiny fraction of this code base and found a critical, election-stealing issue," said Lewis, who is currently executive director of the Open Privacy Research Society, a Canadian nonprofit that develops secure and privacy-enhancing software for marginalized communities. "Even if this [backdoor] is closed its mere existence raises serious questions about the integrity of the rest of the code.""
dr tech

British Parliament hit by cyber security attack - media reports - The Economic Times - 0 views

  •  
    ""Closer investigation by our team confirmed that hackers were carrying out a sustained and determined attack on all parliamentary user accounts in an attempt to identify weak passwords. These attempts specifically were trying to gain access to our emails. "
dr tech

School for teenage codebreakers to open in Bletchley Park | Technology | The Guardian - 0 views

  •  
    "The school will teach cyber skills to some of the UK's most gifted 16- to 19-year-olds. It will select on talent alone, looking in particular for exceptional problem solvers and logic fiends, regardless of wealth or family background, according to Alastair MacWillson, a driving force behind the initiative. "The cyber threat is the real threat facing the UK, and the problem it's causing the UK government and companies is growing exponentially," said MacWillson, chair of Qufaro, a not-for-profit organisation created by a consortium of cybersecurity experts for the purposes of education."
dr tech

China launches quantum satellite for 'hack-proof' communications | World news | The Gua... - 0 views

  •  
    ""The satellite's two-year mission will be to develop 'hack-proof' quantum communications, allowing users to send messages securely and at speeds faster than light," Xinhua reported."
dr tech

Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites / B... - 0 views

  •  
    "There aren't many exit nodes out there. Many people fear that running an exit node will put them in police crosshairs if it gets used in the commission of a crime. For the record, Boing Boing runs a very high-capacity exit node, and though we've received multiple contacts from US law enforcement, we've just explained that this is a Tor node that runs with logging switched off, and thus we have no information that'll be relevant to any investigations, and the officers involved have thanked us and gone away without further trouble. "
dr tech

China is blocking online searches about the Panama Papers - 0 views

  •  
    "China's internet censors have cracked down on searches about the Panama Papers, a massive leak of documents that reportedly tie the relatives of current and retired Chinese politicians, including President Xi Jinping, to offshore companies used for tax evasion. The reports by an international coalition of media outlets working with the Washington-based International Consortium of Investigative Journalists, or ICIJ, are based on documents from the Panama-based law firm Mossack Fonseca, one of the world's biggest creators of shell companies."
dr tech

The UK government's voice-over-IP standard is designed to be backdoored / Boing Boing - 0 views

  •  
    "GCHQ, the UK's spy agency, designed a security protocol for voice-calling called MIKEY-SAKKE and announced that they'll only certify VoIP systems as secure if they use MIKEY-SAKKE, and it's being marketed as "government-grade security." But a close examination of MIKEY-SAKKE reveals some serious deficiencies. The system is designed from the ground up to support "key escrow" -- that is, the ability of third parties to listen in on conversations without the callers knowing about it."
dr tech

Google is giving a big boost to Gmail security - 0 views

  •  
    "Google announced on its blog that it is expanding upon Safe Browsing to alert Gmail users about the possibility of suspicious government activity. Since 2012, Google has put a banner on top of users' Gmail pages that had a warning about state-sponsored attackers if Google believed they were in danger, but starting today people will get a full-page warning about it - very hard to miss."
dr tech

Government keeping its method to crack San Bernardino iPhone 'classified' | Technology ... - 0 views

  •  
    "A new method to crack open locked iPhones is so promising that US government officials have classified it, the Guardian has learned."
dr tech

North Korea's paranoid GNU/Linux watermarks every file / Boing Boing - 0 views

  •  
    "The OS is a marvel of paranoid terribleness, with lots of marvellously bad features. The one I was most interested in is its covert insertion of watermarks into every file that it touches, either on the OS's launch disk or removable USB sticks."
dr tech

Tech firms warn snooper's charter could end strong encryption in Britain | Technology |... - 0 views

  •  
    ""Nothing in this bill ensures the security of that data, either. Instead it turns every business providing telecommunications in or to the United Kingdom into an attack vector. The best way to guarantee the safety of user data is for it to not exist. Our national security will be significantly enhanced if we store less data, not more, and increase the use of strong cryptography, rather than reducing it.""
dr tech

Tomorrow's Surveillance: Four Technologies The NSA Will Use to Spy on You - Soon - 0 views

  •  
    "The NSA's plans don't end with collecting your phone records. Here are just a few of the ways the National Security Agency (NSA) will be keeping tabs on you in the world of tomorrow. Prepare to be shocked, amazed, and a little freaked out."
dr tech

Bahraini activist sentenced to 6 months in jail for one tweet - 0 views

  •  
    "Prominent Bahraini activist Nabeel Rajab was sentenced to six months in jail on Tuesday after criticizing the country's security forces on Twitter. Rajab was arrested in October for tweeting that Bahrain's security organizations are "ideological incubators" for those who join terrorist groups."
dr tech

US Central Command Twitter account hacked to read 'I love you Isis' | US news | The Gua... - 0 views

  •  
    "In an act of cyber vandalism that appeared more embarrassing than destructive, the Twitter and YouTube accounts for US military forces in the Middle East and South Asia were hacked by supporters of Islamic State militants on Monday."
dr tech

UK prime minister wants to ban encrypted messaging apps like Snapchat - 0 views

  •  
    "If reelected, British Prime Minister David Cameron would consider banning messaging apps like Snapchat and WhatsApp, if they don't make their data available to intelligence agencies, he said Monday."
dr tech

Great Firewall of Cameron blocks Parliamentary committee on rendition/torture - Boing B... - 0 views

  •  
    "Like China's Great Firewall, the UK firewall is a patchwork of rules and filters that are opaque to users and regulators. Every ISP uses its own censorship supplier to spy on its customers and decide what they're allowed to see, and they change what is and is not allowed from moment to moment, with no transparency into how, when or why those decisions are being made. "
dr tech

NSA leak reveal plans to subvert mobile network security around the world - Boing Boing - 0 views

  •  
    "The NSA's AURORAGOLD program -- revealed in newly released Snowden docs -- used plundered internal emails to compromise nearly every mobile carrier in the world, and show that the agency had planned to introduce vulnerabilities into future improvements into mobile security. "
1 - 20 of 37 Next ›
Showing 20 items per page