Remove Accountability Remove Encryption Remove Government Remove Surveillance
article thumbnail

Predator Files: A Scathing Indictment of EU Surveillance Regulation

SecureWorld News

In a groundbreaking investigative report, the European Investigative Collaborations (EIC) media network, with technical assistance from Amnesty International's Security Lab, has exposed the shocking extent of the global surveillance crisis and the glaring inadequacies of EU regulation in curbing it. Chairman, Cedric Leighton Associates, LLC.

article thumbnail

ProtonMail denies that it spies on users for government agencies

Security Affairs

The popular privacy-focused email service ProtonMail has been accused of offering voluntarily real-time surveillance assistance to law enforcement. The popular privacy-focused email service ProtonMail made the headlines because it has been accused of supporting real-time surveillance carried out by law enforcement.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. Chatting with Snowden on an encrypted IM connection, I joked that the NSA cafeteria menu probably has code names for menu items. Transferring files electronically is what encryption is for.

article thumbnail

City of Dallas has set a budget of $8.5 million to mitigate the May Royal ransomware attack

Security Affairs

The City of Dallas revealed that the Royal ransomware gang that hit the city system in May used a stolen account. The Royal group began reconnaissance activity in April 2023, and the analysis of system log data dates the beginning of the surveillance operations on April 7, 2023. ” reads the report. ” reads the report.

article thumbnail

Elon Musk Wants End-to-End Encryption for Twitter Direct Messages: Too soon or Too Late?

Security Boulevard

Elon Musk Wants End-to-End Encryption for Twitter Direct Messages: Too soon or Too Late? Twitter DMs should have end to end encryption like Signal, so no one can spy on or hack your messages,” Musk said in a tweet. E2EE encrypts data between a sender and receiver so that no third party can access it. brooke.crothers.

article thumbnail

Apple sues NSO Group for abusing state-sponsored Pegasus spyware

Security Affairs

Apple has filed suit to ban the Israeli surveillance firm NSO Group and parent company Q Cyber Technologies from using its product and services. federal court for illegally targeting its customers with the surveillance spyware Pegasus. Apple has sued NSO Group and its parent company Q Cyber Technologies in a U.S. Pierluigi Paganini.

Spyware 94
article thumbnail

Security Blueprints of Many Companies Leaked in Hack of Swedish Firm Gunnebo

Krebs on Security

In August, Gunnebo said it had successfully thwarted a ransomware attack, but this week it emerged that the intruders stole and published online tens of thousands of sensitive documents — including schematics of client bank vaults and surveillance systems. He declined to comment on the particulars of the extortion incident.

Hacking 342