article thumbnail

Faulty DoD Cybersecurity Leaves U.S. At Risk of Missile Attacks

Adam Levin

The report makes several recommendations to mitigate the systemic vulnerabilities, most of them widely recognized best cybersecurity practices including multi-factor authentication, increased video surveillance at facilities, securing server racks and placing tighter controls on removable media such as USB keys.

Risk 199
article thumbnail

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

This week, several media reported that agents of the Russian intelligence reportedly went to Ireland to inspect the undersea cables. Despite the Cable & Wireless bought by Vodafone in July 2012, the Nigella surveillance access point remained active as of April 2013.

Wireless 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. You become convinced that only the insiders know what’s really going on, because the news media is so often wrong. Many have written about how being under constant surveillance changes a person.

article thumbnail

Russian watchdog fines Twitter, Facebook for not moving user data to local servers

Security Affairs

According to the media, these are the largest penalties imposed by the Kremlin on Western IT firms under internet use laws since 2012. On Thursday, a court in Moscow fined Twitter and Facebook 4 million rubles (roughly $63,000) each for refusing to store the personal data of Russian citizens on servers that are located in Russia.

article thumbnail

Cybersecurity Report: June 29, 2015

SiteLock

According to Wikileaks, the whistleblower website, the US National Security Agency (NSA) has been spying on French President Jacques Chirac, Nicolas Sarkozy and Francois Hollande in 2006-2012, Wikileaks says. These files were said to derive from directly targeted NSA surveillance of the communications of multiple French leaders.

article thumbnail

In post-Roe US, experts share how to keep your data private

Malwarebytes

Practice extra caution on social media and don’t post about seeking or providing abortion services. We don’t know what the landscape will look like in this post-Roe world, but as a privacy attorney, I’m deeply concerned about the surveillance tools that law enforcement will use to investigate alleged abortions.”.

Media 87
article thumbnail

If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (important guest post)

Architect Security

And when thousands of protesters are out on the street, the opportunity is ripe for law enforcement to not only surveil the scene but to collect personal information that it can then hold on to for a long time. So your experience will depend on where you are.