Dealing with a Data Breach: Tips from the Trenches
Companies and government agencies use a variety of technologies to protect their networks from unwanted intrusions. The attacks themselves are continuing to escalate in …
Like The NSA And GCHQ, Germany’s Foreign Intelligence Agency Uses A Legal Loophole To Spy On Its Own Citizens
One of the striking features of the responses to Edward Snowden’s leaks about the snooping being carried out by the NSA and GCHQ is …
Copyright Law as a Tool for State Censorship of the Internet
When state officials seek to censor online speech, they’re going to use the quickest and easiest method available. For many, copyright takedown notices do …
Cyber ring stole secrets for gaming U.S. stock market -FireEye
Security researchers say they have uncovered a cyber espionage ring focused on stealing corporate secrets for the purpose of gaming the stock market, in …
David Cameron wants Google and Facebook to monitor terrorist threats
The report into the death of Lee Rigby makes it clear that the British security services wants to force companies like Google, Facebook and …
Recent Comments