rcumvented the law to gain information on UK citizens. The Intelligence and Security Committee (ISC) reviewed the GCHQ reports produced with US intelligence.”



Cyberwar is reality world must fight: UN official



“The international community must wake up to the reality of cyberwar and strive to find ways to stem it, the head of the UN's telecommunications agency said Monday. "There is a cyberwar going on," Hamadoun Toure, secretary general of the International Telecommunication Union, said during a cybersecurity debate at the Geneva Press Club. "Just like a conventional war, there are no winners, only destruction," he warned an audience of reporters, diplomats and technology experts. While Toure declined to pin the blame on individual countries, such attacks have become common currency.”



Researchers hack Verizon device, turn it into mobile spy station

Jim Finkle



“Two security experts said they have figured out how to spy on Verizon Wireless mobile phone customers by hacking into devices the U.S. carrier sells to boost wireless signals indoors.”



Egyptian Government Web Sites Hacked by Anonymous

Jeff Goldman



“HackRead reports that Anonymous Jordan recently breached and defaced eight Web sites belonging to the Egyptian government.The hacked sites belong to the Ministry of Electricity and Energy, the Ministry of Planning and International Cooperation, the Presidency of the Council of Minister's Slums Development Fund, the Ministry of the Supreme Council of Culture, the Red Sea Ports Authority, the National Council for the Welfare of the Families of Martyrs and Invalids Revolution, and two sites belonging to the Ministry of Culture.”



NSA taps Skype chats, newly published Snowden leaks confirm

Julian Sanchez



“Skype audio and video chats, widely regarded as resistant to interception thanks to encryption, can be wiretapped by American intelligence agencies, according to a new report in The Guardian. The report appears to contradict claims by Microsoft that it has not provided the contents of Skype communications to the government.”



How Microsoft handed the NSA access to encrypted messages



“Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryption, according to top-secret documents obtained by the Guardian.”



U.K. Ministry of Defence hit by cyberattack, data stolen

Zack Whittaker



“The latest annual report from the U.K. Parliament's Intelligence and Security Committee (ISC) has disclosed that the U.K.'s Ministry of Defence suffered a cyberattack in which data was stolen. Despite heavy redactions to protect sources and budgets from prying eyes, the admission was buried halfway through the document in a section detailing how the U.K. government can and is protecting itself against foreign cyberthreats and attacks.”



EU businesses can be shut down by new cyber law

Kerry Butters



“New laws on cyberattacks voted in by the European parliament will allow any business found to be engaging in hacking or any other cyber crime to be closed down.”



This Is Not a Test: Emergency Broadcast Systems Proved Hackable

Kim Zetter



“Several models of Emergency Alert System decoders, used to break into TV and radio broadcasts to announce public safety warnings, have vulnerabilities that would allow hackers to hijack them and deliver fake messages to the public, according to an announcement by a security firm on Monday.”




Ex-FBI chief says cyber-terror could wreak 'mass destruction on life, property'



“Former FBI director says United States intelligence officials must do a better job analyzing the mountains of global Internet, telephone and financial data they collect to thwart the cyber terrorists of tomorrow”.


Snowden reveals Australia's links to US spy web


Philip Dorling



“United States intelligence leaker Edward Snowden has provided his first disclosure of Australian involvement in US global surveillance, identifying four facilities in the country that contribute to a key American intelligence collection program.”



DropBox account hacking bypassing two-factor authentication




“Zouheir Abdallah revealed that a hacker already knows the victim’s credentials for Dropbox account that has 2FA authentication enabled, is able to hack it. Few hours ago I was informed that Q-CERT team found a critical vulnerability in DropBox that allows a hacker to bypass the two-factor authentication implemented by the popular file sharing service.”


Brazil allegedly targeted by NSA spying, demands explanation from United States


Chris Welch



“a report in Brazil's daily Globo newspaper claimed that the National Security Agency has been spying on electronic communications and telephone calls originating from the country for the past decade. The Globo story was co-authored by The Guardian's Glenn Greenwald — the journalist who first broke news of sophisticated (and highly classified) US surveillance programs with the help of former NSA contractor Edward Snowden. Today's report is allegedly substantiated by further documentation leaked to Greenwald by Snowden, who is currently seeking asylum in a number of countries in hopes of evading espionage charges in the United States.”



Snowden offered asylum in Bolivia, Nicaragua, Venezuela

Dara Kerr



“The National Security Agency whistleblower Edward Snowden is rumored to be hunkering down in a Russian airport as he awaits passage to any country that will have him. And, it's looking like his wait might soon be coming to an end.

Bolivia, Nicaragua, and Venezuela have all offered Snowden asylum, according to the Guardian.”



The Role of Anonymous in Popular Struggles in the Middle East

Ashley Barnes



“Over the past few years, Anonymous has transformed from an internet subculture into an international activist network capable of taking down the most sophisticated of networks. Its increasingly important involvement in popular struggles, especially and most recently in the Middle East with #OpTurkey and #OpEgypt, merits some reflection.”



It's a hard life being on the run: Inside Edward Snowden's luxury hotel which has its own swimming pool, Turkish baths, gym and library

Jaymi Mccann



“He is one of America's most wanted fugitives, but it seems that Edward Snowden could be living in luxury at a hotel at a Moscow airport.

The Novotel Moscow Sheremetyevo picks travellers up from the airport, transports them in a bus and houses them on a sealed floor, ensuring that they never step on Russian soil.”



UK teams with defence and telecom companies on cyber security

Brenda Goh



“Nine of the world's biggest weapon makers and telecoms providers are teaming up with Britain to bolster the country's cyber security, aiming to tackle the increasing threat of hacking and other such attacks.”



Turkish Police Name RedHack a Cyber Terrorist Organization

Eduard Kovacs



“RedHack has been highly involved in the protests that started in Turkey after authorities announced their intentions to destroy the Gezi Park in Istanbul. Over the past days, the hackers have breached the systems of Turkey’s Directorate of Religious Affairs and the ones of the Istanbul Special Provincial Administration.”



UK Data Privacy Agency Gives Google Ultimatum on Privacy Policy Change

Lucian Parfeni



“A short while ago, the French data protection agency CNIL gave Google an ultimatum to change its privacy policies or face punishment. The company has three months to comply. The French agency also warned that other EU data protection organizations, with which it was working in the investigation, might follow suit. Indeed, the UK Information Commissioner's Office has now given Google a similar ultimatum; the search giant has until September 20 to make several changes to its privacy policy.”



France 'has vast data surveillance' - Le Monde report



“France's foreign intelligence service intercepts computer and telephone data on a vast scale, like the controversial US Prism programme, according to the French daily Le Monde. The data is stored on a supercomputer at the headquarters of the DGSE intelligence service, the paper says. The operation is "outside the law, and beyond any proper supervision", Le Monde says.”



EU adopts stricter penalties for cyber criminals



“Cyber criminals will face tougher penalties in the EU, under new rules adopted by Parliament on Thursday. The draft directive, already informally agreed with member states, also aims to facilitate prevention and to boost police and judicial cooperation in this field. In the event of a cyber attack, EU countries will have to respond to urgent requests for help within eight hours.”



'Master key' to Android phones uncovered



“A "master key" that could give cyber-thieves unfettered access to almost any Android phone has been discovered by security research firm BlueBox. The bug could be exploited to let an attacker do what they want to a phone including stealing data, eavesdropping or using it to send junk messages. The loophole has been present in every version of the Android operating system released since 2009.”



Pro-US hacker 'The Jester' takes aim at nations helping Snowden

Jana Winter



“The self-described patriot hacker known as “The Jester” says he’ll carry out cyber attacks on countries considering granting asylum to Edward Snowden. Beginning early Monday, The Jester hacked into several government websites in Ecuador as reports circulated that Snowden, who divulged secrets on the National Security Agency’s spying programs, could be headed there. With Venezuela emerging as a possible landing spot for Snowden, The Jester told FoxNews.com he could turn his attention to that South American country.”



9 Years After Shadowcrew, Feds Get Their Hands on Fugitive Cybercrook

Kim Zetter



“Nine years after the Shadowcrew carding forum was shuttered in a Secret Service sting operation, a Bulgarian accused of carding activities has been brought to the U.S. to face charges after nearly a decade on the lam. Aleksi Kolarov, 30, was charged in 2004 in connection with an identity theft ring accused of trafficking in more than a million stolen bank card numbers. He was arrested in Paraguay in 2011 and has been held there ever since.”



Technology, Not Law, Limits Mass Surveillance

Ashkan Soltani



“Recent revelations about the extent of surveillance by the U.S. National Security Agency come as no surprise to those with a technical background in the workings of digital communications. The leaked documents show how the NSA has taken advantage of the increased use of digital communications and cloud services, coupled with outdated privacy laws, to expand and streamline their surveillance programs.”



PRISM leak indicates real-time surveillance, says paper



“Fresh details about Prism have emerged after the Washington Post published four more leaked slides detailing the US internet surveillance programme. The paper says the documents indicate the FBI has installed equipment on the property of certain US-based tech firms and passes on retrieved data to the CIA and National Security Agency (NSA). It says in some cases the NSA may be provided with live notifications about a target's activity in "real time". Critics have raised privacy concerns.”