On Executive Order 12333

Schneier on Security

Although electronic surveillance programs authorized by EO 12333 generally target foreign intelligence from foreign targets, its permissive targeting standards allow for the substantial collection of Americans’ communications containing little to no foreign intelligence value.

UAE government denies using ToTok for mass surveillance

Security Affairs

The United Arab Emirates denied reports that the popular mobile app ToTok was used as part of a government massive surveillance program. According to a report recently published by the New York Times , the popular app ToTok was used by the UAE government as a surveillance tool.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Denmark intel helped US NSA to spy on European politicians

Security Affairs

Denmark’s foreign secret service allowed the US NSA to spy on European politicians through a Danish telecommunications hub.

On Chinese "Spy Trains"

Schneier on Security

The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. Like every other piece of modern machinery, modern train cars are filled with computers, and while it's certainly possible to produce a subway car with enough surveillance apparatus to turn it into a "spy train," in practice it doesn't make much sense.

Syria-linked APT group SEA targets Android users with COVID19 lures

Security Affairs

Syrian-linked APT group SEA recently used COVID-19-themed lures as part of a long-running surveillance campaign, security researchers warn. AndoServer samples are purely surveillance software used to spy on the victims, while SLRat is as an Android remote admin tool.

ProtonMail denies that it spies on users for government agencies

Security Affairs

The popular privacy-focused email service ProtonMail has been accused of offering voluntarily real-time surveillance assistance to law enforcement. The popular privacy-focused email service ProtonMail made the headlines because it has been accused of supporting real-time surveillance carried out by law enforcement. Steiger said that ProtonMail offers voluntary support for real-time surveillance without requiring an order from a federal court.

Russian watchdog fines Twitter, Facebook for not moving user data to local servers

Security Affairs

At the end of January, Russia’s telecommunications watchdog Roskomnadzor instituted administrative proceedings against Facebook and Twitter after they refused to store data of Russian users on servers located in the country.

RuNet – Russia successfully concluded tests on its Internet infrastructure

Security Affairs

Of course, the concentration of the traffic through nodes controlled by Moscow could open the door to a massive surveillance. Breaking News Cyber warfare Security Pierluigi Paganini RuNet Russia Security Affairs Security News surveillance

Podcast Episode 122: will 5G increase Internet of Things Risk?

The Security Ledger

Telecommunications firms like to talk up all the great things that so-called 5G cellular networks will bring to smart phones. Telecommunications firms like to talk up all the great things that so-called 5G cellular networks will bring to smart phones. In this week’s podcast: major telecommunications carriers like to talk up the advantages of so-called 5G connectivity to their customers.

Section 889: the US Regulation that extends far beyond the US

IT Security Guru

It went into effect on 13 th August 2020 and addresses the new prohibition on the use of banned telecommunications equipment and services, while also clarifying the ban from 2019 on buying such equipment. the telecommunications and video surveillance services or equipment they work with.??

Russia’s watchdog Roskomnadzor threatens to fine Twitter and Facebook

Security Affairs

Russia’s telecommunications watchdog Roskomnadzor has instituted administrative proceedings against Facebook and Twitter after they refused to store data of Russian users on servers located in the country. On January 29, based on the requirements of the General Prosecutor’s Office of the Russian Federation, Roskomnadzor will restrict access to the mail service Protonmail.com (Switzerland),” reads a press release published by Roskomnadzor, the Russia’s telecommunications watchdog.

Attorney General William Barr on Encryption Policy

Schneier on Security

This is exactly the policy debate we should be having­not the fake one about whether or not we can have both security and surveillance. I served for many years as the general counsel of a large telecommunications concern. CALEA imposes a statutory duty on telecommunications carriers to maintain the capability to provide lawful access to communications over their facilities. That telecommunications company was GTE­which became Verizon.

Attorney General Barr and Encryption

Schneier on Security

This is exactly the policy debate we should be having -- not the fake one about whether or not we can have both security and surveillance. I served for many years as the general counsel of a large telecommunications concern. CALEA imposes a statutory duty on telecommunications carriers to maintain the capability to provide lawful access to communications over their facilities. That telecommunications company was GTE -- which became Verizon.

GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

The Last Watchdog

App developers, credit card, telecommunication companies, and others use the term “anonymous data” because it sells. Despite warnings from cybersecurity academics, whistleblowers or former NSA and CIA agents, the general public shows no animosity toward metadata surveillance. Unless you decide to go Henry David Thoreau and shun civilization altogether, you can’t — and won’t — stop generating data , which sooner or later can be traced back to you.

Russian spies are attempting to tap transatlantic undersea cables

Security Affairs

The Register reports that the secret structures of GCHQ are part of the surveillance programme codenamed “CIRCUIT” and also refers to an Overseas Processing Centre 1 (OPC-1), while another centre, OPC-2, has been planned, according to documents leaked by Snowden.

USCYBERCOM: MuddyWater APT is linked to Iran’s MOIS intelligence

Security Affairs

The group’s victims are mainly in the telecommunications, government (IT services), and oil sectors. According to the Congressional Research Service, the MOIS “conducts domestic surveillance to identify regime opponents.

Information risk and security for professional services

Notice Bored

When you acquire or provide professional services, how do you address the associated information risks?

5G Security

Schneier on Security

These insecurities are a result of market forces that prioritize costs over security and of governments, including the United States, that want to preserve the option of surveillance in 5G networks. The security risks inherent in Chinese-made 5G networking equipment are easy to understand.

Russia-linked BlackEnergy backed new cyber attacks on Ukraine’s state bodies

Security Affairs

The Security Service of Ukraine (SBU) uncovered a new targeted attack on the information and telecommunication systems of Ukrainian government entities. The new malicious code act as surveillance software, they implement surveillance capabilities and remote administration features. The Security Service of Ukraine (SBU) uncovered a new targeted attack launched by BlackEnergy APT on the IT systems of Ukrainian government entities.

Best Facial Recognition Software for Enterprises In 2022

eSecurity Planet

BioID will further benefit companies like banks, telecommunications, and e-commerce that use facial recognition technology and biometrics to execute Know Your Client (KYC) programs.

Cybersecurity Report: July 15, 2015

SiteLock

As a protest against the Indian government’s recent push on net neutrality and Digital India, AnonOpsIndia, a hacktivist group, compromised BSNL (Bharat Sanchar Nigam Limited) Telecommunications’ websites on Friday. Protect your website from hackers and cybercrime.

Third-Party Software Security Scanning

Cisco Security

The Cisco Corona service is similarly tasked with providing surveillance of software, to view its components more clearly and to provide a platform to perform a holistic analysis of the software and associated risks.

NITEC19 – NATO Opens Defense Innovation Challenge calls for C4ISR solutions

Security Affairs

The Agency calls for proposals on solutions that could support NATO’s command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) and of course to improve cyber capabilities. The NATO Communications and Information Agency (NCI) announced the opening of the fourth annual Defense Innovation Challenge (NITEC19) to start-ups, SMEs and academia.

Iran-linked Chafer APT group targets governments in Kuwait and Saudi Arabia

Security Affairs

The Chafer APT group has distributed data stealer malware since at least mid-2014, it was focused on surveillance operations and the tracking of individuals.

Metro Bank is the first bank that disclosed SS7 attacks against its customers

Security Affairs

“This activity was typically only within reach of intelligence agencies or surveillance contractors, but now Motherboard has confirmed that this capability is much more widely available in the hands of financially-driven cybercriminal groups, who are using it to empty bank accounts. We have supported telecommunication companies and law enforcement authorities with an industry-wide investigation and understand that steps have been taken to resolve the issue.”

The Belgacom hack was the work of the UK GCHQ intelligence agency

Security Affairs

Back to September 2013, Belgacom (now Proximus), the largest telecommunications company in Belgium and primarily state-owned, announced its IT infrastructure had suffered a malware-based attack. By installing the malware on the engineers’ computers, the spies had gained control of their machines, and were able to exploit the broad access the engineers had into the networks for surveillance purposes.”

Quad9 to move offices to Switzerland, invites other privacy-focused firms to follow

SC Magazine

The company received a finding of law from the Swiss government that it will not be treated as a telecommunications provider, exempting it from laws that would mandate data collection. surveillance and accept GDPR as a global “gold standard” of privacy protections.

DNS 81

Episode 167: Made in America? Trade Tensions highlight Supply Chain Risk

The Security Ledger

» Related Stories From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military Episode 165: Oh, Canada! Or consider the case unveiled involving the principles of a New York firm, Aventura Technologies , which made tens of millions of dollars selling “Made in America” surveillance cameras, body cameras, turnstiles and other security equipment to the US military, the Department of Energy and the Treasury, among other govt.

Group-IB presents its annual report on global threats to stability in cyberspace

Security Affairs

The most common objective of such attacks is cyberespionage and disruption of major telecommunications companies’ work. The telecommunications sector: Are providers ready for 5G?

A Deep Dive on the Recent Widespread DNS Hijacking Attacks

Krebs on Security

mail.cyta.com.cy: Cyta telecommunications and Internet provider, Cyprus. The attackers didn’t need to enable their surveillance dragnet longer than an hour each time because most modern smartphones are configured to continuously pull new email for any accounts the user may have set up on his device. The U.S.

DNS 204

2020 Predictions: New Challenges for Data Privacy and the 5G Hackathon

Thales Cloud Protection & Licensing

A barrage of news about data breaches, government surveillance, and corporate misconduct has soured consumer sentiment on current data practices privacy regulators and authorities strive to protect consumer rights and shape the future of data protection. Telecommunications companies like AT&T, Sprint and Verizon have begun rolling out 5G service to major cities in the U.S. Today’s innovations and technologies provide tremendous opportunities for enterprises.

IoT 75

Metro Bank is the first bank that disclosed SS7 attacks against its customers

Security Affairs

“This activity was typically only within reach of intelligence agencies or surveillance contractors, but now Motherboard has confirmed that this capability is much more widely available in the hands of financially-driven cybercriminal groups, who are using it to empty bank accounts. We have supported telecommunication companies and law enforcement authorities with an industry-wide investigation and understand that steps have been taken to resolve the issue.”

Security Affairs newsletter Round 238

Security Affairs

WhatsApp sued Israeli surveillance firm NSO Group and its parent Q Cyber Technologies. China-linked APT41 group targets telecommunications companies with new backdoor. A new round of the weekly newsletter arrived! The best news of the week with Security Affairs. Hi folk, let me inform you that I suspended the newsletter service, anyway I’ll continue to provide you a list of published posts every week through the blog.

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Though Paladin has a smaller portfolio relative to other top contenders with 75 companies, the company has a substantial stack of strategic investments in technology, telecommunications, and more.

Iran denies attack against its infrastructure has ever succeeded

Security Affairs

Last week, media reported that the United States has launched a series of cyber attacks on Iran after the Iranian military has downed an American surveillance drone. US President Donald Trump first approved military strikes against Iran in retaliation for downing a surveillance drone, but pulled back from launching them on Thursday night after a day of escalating tensions. surveillance drone, according to people familiar with the matter.”

Iran announced to have foiled a second cyber-attack in a week

Security Affairs

Iran telecommunications minister announced that for the second time in a week Iran has foiled a cyber attack against its infrastructure. Iran has foiled a new cyber-attack, the country’s telecommunications minister Mohammad Javad Azari- Jahromi says.

The future of cyberconflicts

SecureList

While the newer actors are filling the skills gap quickly, the most advanced parties are scaling to obtain global surveillance capabilities through technological supremacy. A list of verticals that should be protected from foreign investments was introduced in French law: energy, water distribution, transportation, health, telecommunications. The ever-increasing role of technology in every aspect of our society has turned cybersecurity into a major sovereignty issue for all states.

APT trends report Q1 2021

SecureList

The victims we observed were all high-profile Tunisian organizations, such as telecommunications or aviation companies. The group’s operations were exposed in 2018, showing that it was conducting surveillance attacks against individuals in the Middle East.