Leigh WILE

179 Flips | 2 Magazines | 9 Likes | 3 Following | 8 Followers | @LeighWILE | Keep up with Leigh WILE on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Leigh WILE”

AUSTRALIA : SIGINT service takes over cyber-security

WiFi's tougher WPA3 security is ready

WiFi security is finally getting an upgrade after 14 years. The Wi-Fi Alliance has officially launched WPA3, the next-generation standard that promises to tackle many of the vulnerabilities that have persisted in wireless networking. Most notably, it brings individualized data encryption that …

Interpol Rolls Out International Voice Identification Database Using Samples From 192 Law Enforcement Agencies

Speech recognition technologies can identify and tag individuals every time they open their mouths, effectively ending anonymity. As Interpol’s …

Report: The NSA has secret spy hubs in major U.S. cities

The Intercept has uncovered an NSA operation many of us never knew existed: the operation of eight secret spy hubs in major U.S. cities.<p>Public …

Japan’s Signals Intelligence upgrade in progress / electronic warfare

INTRODUCTION<p>This is a study of Japan’s ground-based signals intelligence (SIGINT) stations, the 17 (soon to be 19) major facilities that intercept, …

Can you hear me now?: NSA can find & track people with ‘voice-matching technology’

Declassified documents reveal the National Security Agency has been using secret “speaker recognition” technology to identify people by their unique …

When is a back door not a back door?

FBI Director Christopher Wray recently called the inability of law enforcement to crack encryption on cellphones and other devices an “urgent public …

Privacy

Trisis has the security world spooked, stumped and searching for answers

<b>At first, technicians at multinational energy giant Schneider Electric thought they were looking at the everyday software used to manage equipment</b> …

Cybersecurity

Rand Paul prepared to filibuster FISA surveillance reauthorization

Sen. Rand Paul, R-Ky., is prepared to filibuster the reauthorization of Section 702 of the Federal Intelligence Surveillance Act, which is up for a …

Russia-Based Kaspersky Labs Had Access To Stolen NSA Documents Leaked By Hackers

United States government officials claim Russian cybersecurity firm Kaspersky Lab obtained National Security Agency documents that were later …

NSA Chief Mike Rogers’s Classified Retirement Memo Leaks

National Security Agency head Admiral Mike Rogers is retiring in the spring, he reportedly told staffers in a “classified memo” Friday.<p>The memo has …

Donald Trump

‘No matter the laws, the result is abuse’: US whistleblower Edward Snowden on Aadhaar

The former US National Security Agency contractor said it was a ‘natural tendency’ for any government to seek the perfect records of private …

Surveillance

SPACE: Keeping ELINT In Orbit

How antivirus software can be turned into a tool for spying

In the battle against malicious code, antivirus products are a staple

Spying

Spies at the NSA leave in droves for better pay

White House plans to crack down on use of personal cellphones

The White House plans to ban the use of personal cellphones in the West Wing by both staff and guests, press secretary Sarah Huckabee Sanders announced on Thursday, citing security concerns.<p>“The security and integrity of the technology systems at the White House is a top priority for the Trump …

2017 Was The Year Of Hacks. 2018 Probably Won't Be Better.

Remembering Equifax, Uber and all the other data breaches of the last year.<p>The hubbub lasted a full 90 minutes before the sirens could be manually …

Autonomy Warfare

Cyber warfare gets a lot of press these days—if it isn’t the Chinese stealing millions of U.S. Federal personnel records, it’s the Russians breaking …

First UAE spyplane breaks its cover

In addition to its openly acknowledged procurement of three Saab GlobalEye airborne early warning aircraft, based on Bombardier’s Global 6000 …

FBI Software For Analyzing Fingerprints Contains Russian-Made Code, Whistleblowers Say

In a secret deal, a French company purchased code from a Kremlin-connected firm, incorporated it into its own software, and hid its existence from the FBI, according to documents and two whistleblowers. The allegations raise concerns that Russian hackers could compromise law enforcement computer …

6 brutal cyber attacks that shook the world in 2017

Even as the world is moving towards a life more digital than ever before, the threats associated with the digital world are multiplying manifold, …

Bill could let cyber spy agency launch attacks with minimal oversight: report

OTTAWA – Canada's cybersecurity agency is poised to receive new powers with minimal oversight under a proposed piece of federal legislation, a report …

Surveillance

Gravestone, the secretive FBI video-surveillance program you haven’t heard of yet.

When you’re using the internet or your cellphone or basically any electronic device that depends on wireless or internet-based connections to …

Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure

Introduction Mandiant recently responded to an incident at a critical infrastructure organization where an attacker deployed malware designed to …

Cybersecurity

2017 was a dumpster fire of privacy and security screw-ups

2016 may have killed every famous person we ever cared about, but it was tame compared to the dumpster fire of security screw-ups and privacy …

US lawmakers seek temporary extension to internet spying program

Republican leaders in the U.S. House of Representatives are working to build support to temporarily extend the National Security Agency's expiring …

CSE Statement on the Attribution of WannaCry Malware | Communications Security Establishment

CSE believes that a safe and secure cyber space is important for the security, stability and prosperity of our country.<p>We are aware of the statements …

South Korean cryptocurrency exchange Youbit suffers second hack

Youbit has now filed for bankruptcy after the firm lost 17 percent of its assets in the hack. The company did not disclose how much those assets were …

North Korea

UK declares Airseekers to be fully operational | Jane's 360

The United Kingdom has declared its fleet of three L3 Technologies RC-135V/W Airseeker (Rivet Joint) intelligence, surveillance, and reconnaissance …

Trump Transition Team Discussed Michael Flynn Using Signal to Encrypt Conversations, Emails Show

Days before a series of phone calls in late-2016 between Michael Flynn and Russia’s then-ambassador to the United States, members of the presidential …