miniLock app makes Encryption easy!
Use of encryption is on the rise. More than ever before encryption is being adopted by criminals, governments, and wise technology users. The U.S. court systems annual report on law enforcement eavesdropping in 2013 stated that encryption foiled state police attempts to serveil criminal suspects in 9 different cases. That…
The National Security Agency is collecting millions of images intercepted from global communications for a facial-recognition program to identify and track intelligence targets, according to classified documents described by The New York Times.The agency is using sophisticated software to harvest "millions of images per day" from emails, text messages, social media, videoconferences, and other communications,…
The Day We Fight Back protesters in San Francisco gathered in front of the AT&T building for another protest and to give a retired AT&T technician another chance to have his story heard.In 1996 Klein stole documents that showed that the NSA was collecting data directly from AT&T’s lines and from within AT&T’s own building.…
The National Security Agency’s sophisticated hacking operations go way beyond using software vulnerabilities to gain access to targeted systems. The agency has a catalog of tools providing NSA analysts access to just about every potential source of data about a target.In some cases, the NSA has modified the firmware of computers and network hardware, including…
No one except the NSA knows which 50,000 networks it injected data-thieving malware into, so what's a cautious enterprise network manager to do? It's business as usual. However, what's "usual" these days is vigilance - continuous monitoring and analysis to uncover unusual patterns and proactively respond.
"It is important to adopt protective processes that continuously couple…
Recently Atlanta-based Aaron's Rent-to-Own computer chain has been accused of installing monitoring software onto its computers. The software was able to track a customers' location, took photos using the computers' webcam, and also tracked all keystrokes using a keylogger. Unwary customers private information was sent to Aaron, everything from login credentials from emails to Facebook…
ID Quantique is a small security firm based in Geneva, Switzerland. They specialize in quantum mechanics to boost data security. Their Quantum Key Distribution (QKD) is a method by which a sender transmits a key encoded with photons to a recipient. This is not new technology, this will protect data from hackers and is viewed…
The National Security Agency experimented with a cell phone location tracking program in 2010, but eventually shelved the idea. Director of National Intelligence, James Clapper, declassified the program during a senate testimony today on Capitol Hill.The NSA has repeatedly denied that it tracks Americans’ locations, but its secret documents reveal that GPS data is used…
Several US senators are trying to clamp down on the activities of the National Security Agency through a new bill. Unveiled in Congress on Wednesday, the Intelligence Oversight and Surveillance Reform Act aims to stop the NSA's bulk collection of the records of US citizens. Specifically, the bill wants to amend certain sections of the Foreign…
Google, Microsoft, Facebook, and Apple have joined forces in a civil liberties group to attempt to get the government to be more transparent. They have submitted a letter to President Barrack Obama and Congress to allow ISP's and other telecommunication companies to offer more details about requests from the governmental branches.The Foreign Intelligence Surveillance Court has barred…
Microsoft asked the Obama Administration to allow it to reveal details about how it responded to orders from the government for user account data.Brad Smith, Microsoft's General Counsel, sent a letter to Attorney General Eric Holder saying there is "no longer a compelling government interest" in preventing companies from "sharing more information" about how they…
Microsoft has been working with the NSA since the launch of PRISM. However the relationship between them is closer than we thought. Microsoft has been giving NSA permission to view data before encryption on the Operating System.This stands true for their new email portal Outlook.com. They have launched a site called Scroogled to dissuade users from using Google email.…