government surveillance

US Border Searches and Protesting in the Surveillance Age
Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential tips on smartphone security and ...

Cybersecurity Insights with Contrast CISO David Lindner | 01/31/25
Insight No. 1: You should be staging cyberattacks Cyberattacks are becoming more frequent and sophisticated, posing a significant threat to businesses of all sizes.Crisis simulations — one of which is now included ...

FBI’s Warrantless Spying on US Must Continue, Says FBI
Privacy, schmivacy: FBI head Christopher Wray (pictured) doesn’t see what all the fuss is about. Just renew FISA section 702 already! ...

Apple Warns of Further Compromises by Israel’s NSO Group
The NSO Group, known for their suite of exploitation tools, has once again found itself at the center of unwanted attention when Apple revealed that it had warned a number of individuals, ...

Bad Apples: How CNA Attacks Put Everyone At Risk
On September 14, 2021, two unrelated incidents demonstrated not only the vulnerability of users to state-sponsored attacks but the fact that defenders are relegated to playing “cat and mouse” with attackers (including ...

Secret Govt. Spy Powers Coming Here—via Australia
The Australian government has given itself an enormous surveillance tool. Five Eyes means that rules in Oz can be used here, too ...

AI Surveillance in a Post-Pandemic World
Artificial intelligence (AI) has made waves across industries including automotive, health care, entertainment, finance, manufacturing, and more, while still a nascent technology. Another area where it made a significant impact is law ...

FBI Wants to Invest in Social Media Surveillance Tool
Terrorist organizations know their way around the web, and they don’t shy away from using social networks to communicate with each other or to recruit new members. The FBI is looking into ...

Cyberattack Compromises US Customs and Border Protection Photo Database
Photos of people crossing the US border, taken over a month and a half, including images of their faces and vehicle numbers, were compromised in a malware attack on a subcontractor working ...

China forces spyware onto Muslim’s Android phones, complete with security holes
If you’re a member of the Uyghur Muslim population in Xinjiang, you’re probably used to China’s high level of surveillance that many other countries would find Orwellian. Whereas many of us are ...