How the NSA elite team operates

Sneak into the TAO, the elite division of the NSA whose equipment sounds like James Bond’s one ! So far, the NSA had led to much media news with the PRISM case, a scandal involving major Internet players, via its massive online data espionage of people “suspected to be dangerous.” But the NSA has much

Read More...

Beware of hackers during holiday season!

More and more internet users are online shoppers, especially during the holiday season. This is a a great opportunity for cybercriminals who are always looking for ways to scam Internet users and smartphone users. Below are some of the tricks used by hackers. No Christmas break for cybercriminals! Indeed, they specifically use this time to

Read More...

Cybersecurity to be more complex in 2014

Cybersecurity is going to get much more complicated next year. The global IT nonprofit association ISACA believes that IT and cybersecurity professionals shall face accelerated change and complexity in cybersecurity, data privacy and big data in 2014. “The pace of change expected in 2014 will put incredible pressure on technology professionals in the workplace with a

Read More...

Cybercensorship ranks top in Iran

In the Kerman province located in the southeast part of Iran, the Revolutionary Guards have again blocked some new websites. The official news agency ISNA said: “In a technical large-scale operation of intelligence services (IRGC) in the Kerman province, nine Internet websites which were against to the regime of the Islamic Republic have been blocked.”

Read More...

France: the CNIL stands against cookies

The National Commission on Informatics and Liberties ( CNIL) confirms that websites and advertising agencies should get the webuser’s approval before storing cookies on computers . This is a further step towards a less intrusive internet navigation. The CNIL has issued a “recommendation” that limits the use of cookies, this sort of invisible software that

Read More...

Africa is a paradise for cybercriminals

According to a Symantec study, it is in Africa that cybercrime is most severe. As analysed by Security Affairs, this study shows that it through using smartphones that computer viruses and malware spread the most. “A study conducted in Africa in 2012 showed that the development of smartphones involves the increased use of social networks

Read More...

Internet is omniscient

Your internet activity is permanently stored. Photos, videos, email address, posted messages on social networks expose you to everyone for years. Let’s have a look at your e- reputation. You may be a bit surprised … We do not realize how our digital lives is traceable … For all that is published on the Internet

Read More...

NSA would also monitor online games

According to a new document released by Edward Snowden, the former NSA agent, and published on ProPublica website, online games such as World of Warcraft and Second Life are being monitored, since 2008, by American and British intelligence agencies. Indeed, according to the document, terrorist and criminal organizations would be using online games to communicate

Read More...

European Council and Microsoft fighting cybercrime together

The European Council and Microsoft have just signed an agreement concerning their cooperation in the new Cybercrime @ Octopus Microsoft Project. This project, which will start on January 1st 2014, aims to help countries around the world to implement the European Council Convention on Cybercrime and strengthen data protection and safeguards of the rule of

Read More...

Google condemns but supports censorship

Eric Schmidt, Google’s CEO, recently commented about his conviction before the U.S. Johns Hopkins University that Internet censorship should end within a decade. Google boss also said that a better encryption use shall allow users to fight against governments’ oversight. Eric Schmidt clearly targets dictatorial regimes or those practicing a strict control of the Internet

Read More...