Blog Posts - Eavesdropping



Samsung swears its smart TVs aren't eavesdropping on you

Over the weekend, quite a few people panicked at the phrasing of Samsung's smart TV privacy policy. Its warning that third parties would get your sensitive spoken info conjured up images of Orwellian telescreens spying on their viewers. The reaction...
by engadget on Feb 10, 2015

David Truong, Figure in U.S. Wiretap Case, Dies at 68

His conviction on espionage charges in 1978 raised alarms about the federal government’s use of wiretaps without court orders and spurred passage of the 1978 Federal Intelligence Surveillance Act.
by Eastasianews on Jul 8, 2014

Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping

Exploits allow attackers to obtain private keys used to decrypt sensitive data. For a more detailed analysis of this catastrophic bug, see this update, which went live about a few minutes […]...

Spying by N.S.A. Ally Entangled U.S. Law Firm

A top-secret document, obtained by the former N.S.A. contractor Edward J. Snowden, shows that an American law firm was monitored while representing a foreign government in trade disputes with the United States.    ...
by Eastasianews on Feb 15, 2014

Eavesdropping Ensnared American Law Firm

A top-secret document, obtained by the former N.S.A. contractor Edward J. Snowden, shows that an American law firm was monitored while representing a foreign government in trade disputes with the United States.    ...
by Eastasianews on Feb 15, 2014

"If You Like Your Civil Liberties, You Can Keep Them"

...
by Proof Positive on Jan 20, 2014

Types of Computer Attacks

Types of Computer AttacksOur computer systems are vulnerable to different types of attacks. To protect the systems from these attacks, it is important to know common computer attacks...In today's world, it has become an almost everyday situation w...
by le monde informatique on Jan 11, 2014

4096-bit RSA Key Extraction Attack via Acoustic Cryptanalysis

A trio of scientists have verified that results they first presented nearly 10 years ago are in fact valid, proving that they can extract a 4096-bit RSA key from a laptop using an acoustic side-channel attack that enables them to record the noise com...
by insecure on Dec 25, 2013

White House Aware of Eavesdropping

A smashing article in the L.A. Times reports that sources tell the newspaper that the White House was aware and signed-off on eavesdropping on friendly leaders of the world including Germany, Mexico, and Brazil. The real scandal here is that the Whit...
by Sparking the Left on Oct 29, 2013

[Tempora project] Internet, Surveillance and the “merits” of Technology…

Tempora project: Underwater Internet cables offer UK the unique opportunity to eavesdrop on 99% of the world’s communications. [1] (yes, …Continue reading »...
by Harmonia Philosophica on Jul 13, 2013

"Reach Out and Touch Someone"

Remember that old jingle from the phone company? Guess today, it has a whole new meaning!Dame Maggie over at Maggie's Notebook, has an excellent article on the latest breaking news in the NSA eavesdropping debacle: NSA: They’re Listening In, Readin...
by Proof Positive on Jun 16, 2013

Twitter App 5.0 vulnerable to eavesdropping

## Twitter App vulnerable to eavesdropping   * Vendor: Twitter Inc. * Product: Twitter 5.0 * Tested on: iPhone 4 (iOS 6.0) * Vendor notification: Nov 10, 2012. * Risk level: Low * Researcher: Carlos Reventlov * Link: http://reventlov.com/advisor...
by MondoUnix on Nov 25, 2012

F.B.I. Admits Hacker Group’s Eavesdropping

The organisation well known as Anonymous listened in upon a call in between a bureau, Scotland Yard as well as alternative unfamiliar military agencies about their corner review of a organisation as well as the allies. NYT > Technology Subscribe to t...
by Discount Cameras on Feb 4, 2012


Trending Topics

Close