Tagged With security centre


In a time when it seems like the privacy we all enjoyed was just a smokescreen, it's nice to know there's at least one way to fight back against all the systems designed to keep track of our comings and goings. Developed by Japan's National Institute of Informatics, these glasses include 11 LEDs that blast a privacy curtain of near-infrared light to obscure your face.


Although there's been some debate on the legality of the mounds of data collected by NSA analysts during the PRISM program, House Intelligence Committee officials have confirmed that they're totally free to rifle through your data without a court order. As long as they think they might have a reason to be suspicious — any reason will do! — they're free to go nuts.


The Man has his hand in your inbox and cops are intimidating citizens who film them beating other citizens. So it's only logical to want to keep the private contents of your SD card, well, private. The Covert Coin from CCS Spy Gear is a precision-machined piece of retired US currency that are nearly indistinguishable from the real thing when closed.


It's only natural to be a little skeeved out by the idea that the government is slurping up your private data behind the scenes, but there's a very public piece of your data being collected as well: the look on your face. There's already a national database of over 120 million faces in the US, and the Washington Post reports that it's slowly turning into the ultimate police tool.


The impact of the NSA's secret surveillance through PRISM and other means has sent reverberations through out the tech industry and the world at large. The latest ripple: Apple's full accounting of its interactions with government spies in the past year or so. Here's what went down.


There's been a lot of talk about the NSA and its data-gathering policies. The news sounds kind of scary. But you might be thinking that the NSA can't have literally every foreign and domestic call made in the US. That would be a crazy amount of data right? Well, yes, it would be, and it kind of seems like it has it. Or at least it could afford to keep it if it wanted to.


Ever since news of PRISM broke, there's been a lot of confusion and denial about exactly how the NSA is getting your information from the companies that have been collecting it. Now Google's fessed up to the details, and it's unsurprisingly simple: by FTP or even by hand.


There are plenty of reasons to be discomforted the recent NSA PRISM scandal, chief among them the total obliteration of any remaining notion of privacy. But there's another — less pressing, but still confidence-shattering — concern that has echoed around our internet's hallowed halls this past week: the fact that this massive, top-secret, data-mining government enterprise allowed a drunk eight-year-old to design their PowerPoint slides.


Yesterday, the Washington Post and The Guardian dropped concurrent bombshell reports. Their subject was PRISM, a covert collaboration between the NSA, FBI, and nearly every tech company you rely on daily. PRISM has allowed the government unprecedented access to personal information for at least the last six years. But what is it, exactly?


Keys have been around for hundreds, if not, thousands of years. We've all used them. We generally understand how they work and how vulnerable they can be. Some are better than others. And now that the simplest of devices in the home are connecting to the cloud, it's time to figure out just how safe or smart these new-fangled smart locks really are.


All but seven states in the US have proposed or adopted legislation relating to the domestic use of drones, or unmanned aerial systems, in domestic airspace, according to the National Conference of State Legislatures. Now, at the invitation of the Aerospace States Association, EFF has rung in with the three crucial elements that all drone legislation must contain to balance privacy rights with free-speech concerns.


A particularly nasty breed of malware is raiding people's Facebook profiles and emptying their bank accounts. Its name is Zeus, and, yes, it is all powerful. Because despite the fact that this money-grubbing, Likejacking malware has been around for years stealing both private and government data, cybersecurity experts are still stumped about how to stop it.