Google-hatched Security Planner matches expert advice with your worst security fears
Security Planner could save your parents from ransomware stealing their family photo collection.
Security Planner could save your parents from ransomware stealing their family photo collection.
NSA whistleblower Edward Snowden has come up with a concept iPhone case that can help prevent the government from finding your location.
Michael Kan | 22 Jul | Read more
Christopher Soghoian works for the team within the ACLU that sues the FBI and other agencies over their use of surveillance. His Twitter profile simply says “I fight surveillance”.
Anthony Caruana | 25 May | Read more
The federal government has refused to recognise a decision by a US appeals court which ruled that mass collection of telecommunications metadata.
Andrew Colley | 17 Jun | Read more
Everyday people are transforming the way police officers behave thanks to the power of camera-enabled smartphones. Now, the advocacy group Transparency Toolkit wants to transform the way the national security state behaves using other common tech tools: Google and LinkedIn.
As new metadata retention laws drive many Australians to use secure messaging applications instead of conventional telephony services, the head of Interpol has warned that authorities' ability to properly investigate a broad range of crimes will be impacted unless software vendors reconsider the strength of the security they are providing.
David Braue | 01 Apr | Read more
Symantec has revealed details about a family of malware it says is a “top tier” espionage tool with sophisticated features on a level comparable with Flame and Stuxnet.
You wouldn't likely know if you are under cell phone surveillance, but you would if you were about to make a call and your phone displayed an unencrypted connection warning that states, "Caution: The mobile network's standard encryption has been turned off, possibly by a rogue base station (IMSI Catcher'). Unencrypted calls not recommended."
Darlene Storm | 03 Sep | Read more
When you signed up with your ISP, or with a wireless carrier for mobile devices, if you gave it any thought at all when you signed your name on the contract, you likely didn't expect your activities to be a secret, or to be anonymous, but how about at least some degree of private? Is that reasonable? No, as the law currently suggests that as a subscriber, you "volunteer" your personal information to be shared with third-parties. Perhaps not the content of your communications, but the transactional information that tells things like times, places, phone numbers, or addresses; transactional data that paints a very clear picture of your life and for which no warrant is required.
From his hideout in Russia, where he is seeking asylum following his incredible revelations, former CIA employee and NSA contractor Edward Snowden addressed the crowd at the SXSW conference.
Anthony Caruana | 11 Mar | Read more
Facing a real business threat from the fallout from the NSA's intelligence gathering, tech sector luminaries are expanding their presence in Washington as they lobby for surveillance reforms.
Kenneth Corbin | 26 Feb | Read more
An IBM shareholder has sued Big Blue over claims it hid the impact of the National Security Agency’s surveillance program PRISM on its sales in China.
Forrester, which says $180B will be lost to U.S. firms over Snowden leak, sees an opportunity for countries open about their surveillance
Antone Gonsalves | 17 Aug | Read more