Web hero Snowden questions Putin about mass surveillance

NSA leaker Edward Snowden is living under asylum in Russia escaping charges for government revelations which could be seen as treason. Since he is now dwelling in the land of the controversial Russian government – it makes sense he wanted to know about the country’s own surveillance.

During a live, state-run television broadcast he was able to go straight to the top.

Snowden quizzed Russian president, Vladimir Putin, and attempted to get clarification on whether Russia’s online spying...

By Ryan Daws, 17 April 2014, 0 comments. Categories: Consumers, Industry, Security.

NSA has been monitoring VTech users since ‘76

In the latest set of revelations, Edward Snowden has released documents stating the National Security Agency has been keeping a close eye on the activities of VTech users for “any suspicious activity” since 1976 – when the electronic learning product manufacturer was originally founded.

VTech is yet to comment – but users of the company’s devices have been surprisingly vocal in their thoughts…

Helen, 3, from the UK says: “Just when you think...

By Ryan Daws, 01 April 2014, 0 comments. Categories: Consumers, Industry, Security.

Kickstarter breach – An expert’s analysis

If you followed the news over the past week; you will likely have heard about the crowd-funding site Kickstarter and their breach of user details.

But how does such a high-profile breach occur? TelecomsTech reached out to an internet security expert contact for further details…

Our expert today is Nick Hatter; who has a background of exposing potential threats.

Hatter advises TelecomsTech that whilst Kickstarter uses a hash-based system to encrypt user passwords; these systems in general aren’t...

By Ryan Daws, 18 February 2014, 0 comments. Categories: Cloud, Consumers, Industry, Security.

LTE Security: Backhaul to the Future

It's hard to hit moving targets, but subscribers to 4G and LTE networks need to be assured that their data has better protection than just being part of a high volume, fast-moving flow of traffic. This is a key issue with LTE architectures – the connection between the cell site and the core network is not inherently secure. 

Operators have previously not had to consider the need for secure backhaul.

2G and 3G services use TDM and ATM backhaul, which proved relatively safe against external...

By Kimmo Klemola, 13 February 2014, 0 comments. Categories: Industry, Infrastructure, Security.

Are you under surveillance? Tech giants will reveal request data…

Snowden’s revelations surrounding the NSA’s intrusive surveillance programmes caused mass outcry from the general public and members of certain commissions. One of those he leaked was of PRISM –a slide revealed access to most of the major consumer tech giants’ servers.

The law has always been companies must hand over information they hold about individuals if the...

By Ryan Daws, 04 February 2014, 0 comments. Categories: Consumers, Industry, N America, Security.

'Blackphone' is the choice for Heisenberg, and those looking to hide from the NSA

The NSA revelations keep coming in thick and fast - every day is a new story. Today’s episode reveals the US government security agency can use radio waves to monitor computers they can’t access via the World Wide Web. Anyone else yawning? Nothing is a surprise anymore.

Honestly, most of us have given up on the thought of having privacy from the government – but if it meant our actual personal or work security is at risk; we’d probably pay more attention.

If we’ve learnt anything from

By Ryan Daws, 15 January 2014, 1 comment. Categories: Devices, Mobile, Security.

NETRA is the Indian NSA’s PRISM equivalent

If you thought the United States’ NSA (National Security Agency) was the only government agency with intrusive spying measures – you’d be wrong. Perhaps not wanting to run into the same kind of fire the US has; the Indian intelligence agencies appear to be more open about their efforts.

The project, known as NETRA (Network Traffic Analysis), will detect and capture any voice traffic which could be linked...

By Ryan Daws, 06 January 2014, 0 comments. Categories: Broadband, India, Infrastructure, Security.

Consoles are offering the Portal to hackers

Forget the NSA; it’s your shiny new console which could offer the biggest threat to cyber-security in your home. According to security firm Kaspersky Labs, hacking attempts against consoles have rocketed since this year’s big new releases.

The company is estimating around 34,000 attacks per day, and is aware of around 4.6 million pieces of gamer-focused malware.

Spain currently gets the most unwanted attention; with 138,786 attacks so far...

By Ryan Daws, 18 December 2013, 0 comments. Categories: Cloud, Consumers, Security.

Human-eyes only: Bots now 'account for 61% of web traffic'

In some staggering research by Incapsula; the firm suggests that 61% of all website traffic is now generated by automated bots - a rise of an incredible 21% over last year.

Of course not all bot traffic is malicious; much of it such as search engine “spiders” is actually helpful and improve the web experience for users.

So do you want the good, or the better news first?

Most of the growth in traffic was in these “friendly” bots. Examples of these are; tools used by search engines...

By Ryan Daws, 13 December 2013, 0 comments. Categories: Cloud, Industry, Networks, Security.