The UK runs a secret internet surveillance station in the Middle East which it uses to capture and process huge quantities of emails, telephone calls and internet traffic on behalf of GCHQ and the US National Security Agency (NSA). The ...
Tags: Computer Products, software, data
A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye. Poison Ivy is a remote access trojan (RAT) that was released eight ...
Tags: Computer Products, software
Researchers showed a Black Hat audience how femotcell technology, used by phone companies to boost cell phone coverage, can be hacked to intercept cell phone calls, text messages and other data. Tom Ritter and Doug DePerry , researchers ...
Tags: Phone Calls, Exploit Cellular Tech
European Union researchers using the GEANT network will, from Wednesday, be able to access capacity of up to 2 terabits per second. GEANT is the superfast pan-European research network that helped discover the Higgs Boson particle at the ...
Tags: Network Upgrade
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave. ...
Tags: Computer Products, softwre
A recent targeted attack that used Chinese malware compromised over 1,000 computers belonging to dozens of South Korea organizations, according to researchers from Israeli security firm Seculert. The main malware tool used in the attack ...
British spy agency GCHQ is tapping global internet traffic and phone calls, processing information from around the world which it is sharing with its opposite number in the US, the National Security Agency (NSA). That is the latest ...
Tags: Computer Products, software
More secret National Security Agency documents leaked by Edward Snowden to The Guardian suggest that the U.S. agency's British counterpart intercepts petabytes worth of communication data daily from fiber-optic cables. The operation ...
Smartphone maker BlackBerry, which enjoys a particularly strong niche in the enterprise due to its security claims, has defended itself against allegations that its security was penetrated by the spies at GCHQ. According to the Guardian, ...
Tags: Blackberry, Computer Products, Smartphone
GigOptix Inc of San Jose, CA, USA (a fabless supplier of analog semiconductor and optical communications components enabling high-speed end-to-end information streaming over optical fiber and wireless networks) says that it has demonstrated ...
Tags: GigOptix, Electrical, Electronics
Texas is poised to become the first state in the U.S. to require law enforcement officers to get a search warrant based on probable cause before they access any electronic communications and customer data stored by a third-party service ...
Google plans to upgrade the security of its Secure Sockets Layer (SSL) certificates, an important component of secure communications. SSL certificates are used to encrypt communication and verify the integrity of another party with which ...
Tags: Google, SSL Encryption Keys, August
Freescale Semiconductor of Austin, TX, USA, which provides RF power technology for cellular markets, has introduced an enhancement-mode pseudomorphic high-electron-mobility transistor (pHEMT) low-noise amplifier (LNA) based on GaAs process ...
33-year pro to help window makers, consumers meet stricter energy-saving mandates - PPG Industries (NYSE: PPG) has named Bradley P. Boone market manager, residential segment, PPG flat glass. A 33-year PPG veteran, Boone brings vast ...
Tags: PPG, Glass Segment, Glass
Mobile security vendor Lookout plans to start flagging as adware mobile apps that use aggressive ad networks if they don't obtain explicit consent from users before engaging in behavior that potentially invades privacy. Ad networks, ...
Tags: Mobile security vendor, Lookout