Remove 2012 Remove Encryption Remove Information Security Remove Surveillance
article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. Those secrets collectively have a code name—ECI, for exceptionally compartmented information—and almost never appear in the documents. I started doubting my own security procedures.

article thumbnail

Experts Explain How to Bypass Recent Improvement of China’s Great Firewall

Security Affairs

Last year, the group published a detailed analysis on how the Chinese government has improved its surveillance system to detect and block the popular circumvention tools Shadowsocks and its variants. Shadowsocks is a free and open-source encryption protocol project, widely used in China to circumvent Internet censorship.

Firewall 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malicious app exploiting CVE-2019-2215 zero-day available in Google Play since March

Security Affairs

According to Stone, the CVE-2019-2215 vulnerability was being used or sold by the controversial surveillance firm NSO Group , it was exploited by its surveillance software Pegasus. SideWinder, a group that has been active since 2012, is a known threat and has reportedly targeted military entities’ Windows machines.

article thumbnail

CISSPs from Around the Globe: An Interview with James Wright

CyberSecurity Insiders

The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in information security. Those doors lead to many different types of positions and opportunities, thus making the information security community dynamic and multifaceted.