article thumbnail

Predator Files: A Scathing Indictment of EU Surveillance Regulation

SecureWorld News

In a groundbreaking investigative report, the European Investigative Collaborations (EIC) media network, with technical assistance from Amnesty International's Security Lab, has exposed the shocking extent of the global surveillance crisis and the glaring inadequacies of EU regulation in curbing it. Chairman, Cedric Leighton Associates, LLC.

article thumbnail

US NCSC and DoS share best practices against surveillance tools

Security Affairs

The US NCSC and the Department of State published joint guidance on defending against attacks using commercial surveillance tools. In the last years, we have reported several cases of companies selling commercial surveillance tools to governments and other entities that have used them for malicious purposes. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

Yesterday, Attorney General William Barr gave a major speech on encryption policy -- what is commonly known as "going dark." But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. After all, we are not talking about protecting the Nation's nuclear launch codes.

article thumbnail

Five-Eyes Intelligence Services Choose Surveillance Over Security

Schneier on Security

Many of the same means of encryption that are being used to protect personal, commercial and government information are also being used by criminals, including child sex offenders, terrorists and organized crime groups to frustrate investigations and avoid detection and prosecution. This is important.

article thumbnail

Attorney General Barr and Encryption

Schneier on Security

Last month, Attorney General William Barr gave a major speech on encryption policy­what is commonly known as "going dark." But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. After all, we are not talking about protecting the Nation's nuclear launch codes.

article thumbnail

WhatsApp refuses to weaken encryption, would rather leave UK

Malwarebytes

In fact, WhatsApp would rather cease serving UK users, which make up 2% of its global market, than weaken its end-to-end encryption (E2EE). At the moment, organizations cannot scan end-to-end encrypted messages. This also precedes state-mandated surveillance on a mass scale, with privacy and security risks affecting entire societies.

article thumbnail

Exposed security cameras in Israel and Palestine pose significant risks

Security Affairs

Many poorly configured security cameras are exposed to hacktivists in Israel and Palestine, placing the owners using them and the people around them at substantial risk. While this communication system is useful for transferring real-time data, it offers neither encryption nor lockout mechanisms against password-guessing.

Risk 92