Cybersecurity

The NSA Archive

The suspicions the National Security Agency has gone far beyond its mandate of gathering information for counter-terrorism and foreign intelligence purposes were confirmed when, on June 5, 2013, The Guardian released the first in a series of documents provided by Edward Snowden detailing the NSA’s unlawful spying activities. The American Civil Liberties Union (ACLU) has

Home Routers a Big Consumer Cyberthreat?

Home routers and firewalls are supposed to make users easy and safely connect many devices to their Internet connection. Those devices were advertised to make your Internet safer. In many cases they helped, but more and more often they itself be a real security problem. Strange but saddly true. Home Routers Pose Biggest Consumer Cyberthreat

Cybersecurity framework for critical infrastructure

White House pushes cybersecurity framework for critical infrastructure article tells that U.S. President Barack Obama’s administration has releases a new cybersecurity framework. It aims to help operators of critical infrastructure develop comprehensive cybersecurity programs. It tries to drive changes in the way organizations deal with cybersecurity, which is not always in good shape based constant flow of

My firewall was a security risk

Diffrent DNS vulnerabilities and DNS amplification attacks have been on network security news lately. Yesterday I got e-mail from my ISP Elisa that I had an open DNS server running on my Internet connection, and it should be immediately disabled (someone had reported on problems with this). I was wondering what was happening, because none

HTTP security headers

I just some days ago checked some interesting articles on HTTP security. It really seems that I should look more into those HTTP security headers. 4 HTTP Security headers you should always be using article tells that because HTTP is an extensible protocol browsers have pioneered some useful headers to prevent or increase the difficulty

Information leaking on apps, pictures and video

It seem that you are almost always leaking some information without you knowing about them. Tracking the users is the invisible business that funds the web. Also spies target ‘leaky’ phone apps because they transmit users’ private information across the Internet. Also photos can reveal more information that you can see with your eyes. Your

Spies target ‘leaky’ phone apps

New York Times, Guardian and ProPublic have reported that Spy Agencies Probe Angry Birds and Other Apps for Personal Data. In their globe-spanning surveillance for terrorism suspects and other targets, the National Security Agency and its British counterpart have been trying to exploit a basic byproduct of modern telecommunications: With each new generation of mobile