Following the Snowden leaks revealing Bullrun – the NSA program to crack the world’s encryption – there is an emerging consensus that users can no longer automatically trust any security.
Clearswift Acquires Jedda Systems
Clearswift, an information governance (or data loss prevention) specialist, has announced the acquisition of the intellectual property rights of Australian firm Jedda Systems – and CEO Heath Davies says ‘watch this space’ for more acquisitions.
With a Sale Looming, Struggling BlackBerry Joins FIDO Alliance
Marking one of the first efforts by mobility specialists to get involved in the Fast IDentity Online (FIDO) Alliance, the industry consortium revolutionizing online authentication with the first standards-based specifications, BlackBerry has joined the…
NSA and GCHQ Crack Majority of Encrypted Traffic
Given the effort taken by the NSA and GCHQ spy agencies to monitor the greater part of the world’s internet traffic, it was never likely that they would simply ignore all of the encrypted traffic. The latest of the Edward Snowden files show that they d…
Hand of Thief Trojan Has No Claws
The Hand of Thief (HoT) trojan made waves when it hit the Russian cybercrime underground in July, claiming to target all Linux distributions. But the commercial malware is more like a commercial nowhere: it turns out, the hand is easily amputated.
Bugcrowd Snags $1.6 Million for Crowdsourcing Bug Hunting
Crowdsourcing is big. Bug bounties are big. Why not put them together? San Francisco/Australia-based startup Bugcrowd says why not indeed.
Barret Brown Gagged by Order of the Court
The arrest and trial of Barret Brown, activist and one time self-styled voice of Anonymous, concerns activists and media alike: in theory he faces 100 years in jail for hiding his computer, threatening an FBI agent, and publishing an internet link.
WikiLeaks Publishes Spy Files #3
WikiLeaks has published its latest tranche of files, which it calls Spy Files #3, on the global covert surveillance industry: 249 documents from 92 intelligence contractors. The purpose is to shine “a light on the secretive mass surveillance industry.”…
Kali Linux 1.0.5 and Software Defined Radio
Today we are pleased to announce the immediate availability of Kali Linux 1.0.5 with a rollup of various tool additions, fixes, and upgrades, including our fix for the encrypted encrypted LVM installation issue that we documented last week. As usual, u…
Samsung Bundles Anti-virus into Android KNOX
Samsung is looking to thicken the walls, as it were, in its Android KNOX security-hardened mobile devices, by bundling in enterprise anti-virus from Lookout Software.