Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian

The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.

Fuente: Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian


Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador

El gigante de la informática criticó el papel de los gobiernos y organizaciones que coleccionan vulnerabilidades informáticas que después pueden ser robadas o vendidas a delincuentes informáticos. La empresa pide que lo sucedido sea una lección para erradicar esta práctica en el mundo.

Fuente: Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador


Leaked NSA Malware Threatens Windows Users Around the World

“This is as big as it gets,” Hickey said. “Nation-state attack tools are now in the hands of anyone who cares to download them…it’s literally a cyberweapon for hacking into computers…people will be using these attacks for years to come.”

Fuente: Leaked NSA Malware Threatens Windows Users Around the World


Russian cybersecurity experts suspected of treason linked to CIA | World news | The Guardian

Two of Moscow’s top cybersecurity officials are facing treason charges for cooperating with the CIA, according to a Russian news report.The accusations add further intrigue to a mysterious scandal that has had the Moscow rumour mill working in overdrive for the past week, and comes not long after US intelligence accused Russia of interfering in the US election and hacking the Democratic party’s servers.

Fuente: Russian cybersecurity experts suspected of treason linked to CIA | World news | The Guardian


¿Por qué China prohibió los juegos de realidad aumentada? – El Mostrador

El gigante asiático ha decidido prohibir aplicaciones para celulares como el mundialmente popular Pokémon Go porque “amenaza a la seguridad” de los ciudadanos. ¿A qué se refieren los censores y cuáles son esos riesgos?

Fuente: ¿Por qué China prohibió los juegos de realidad aumentada? – El Mostrador


With authoritarianism and state surveillance on the rise, how can civil society be protected from digital threats?

Policymakers have given a great deal of attention to the cyber security of governments, critical infrastructure, military targets and commercial enterprises. But civil society groups are also under threat, including human rights defenders, environmental activists, political watchdogs, and other groups promoting the rule of law and democracy.What can be done about these digital threats to civil society around the world?

Fuente: With authoritarianism and state surveillance on the rise, how can civil society be protected from digital threats?


Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email

Contrary to a denial by Yahoo and a report by the New York Times, the company’s scanning program, revealed earlier this week by Reuters, provided the government with a custom-built back door into the company’s mail service — and it was so sloppily installed that it posed a privacy hazard for hundreds of millions of users, according to a former Yahoo employee with knowledge of the company’s security practices.

Fuente: Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email


NSA Theft Suspect Worked For Contractor That Sells the Government Tech for Spotting Rogue Employees

Booz Allen Hamilton, the defense contracting giant whose employee was charged Wednesday in connection with the theft of hacking codes used by the National Security Agency, provides a fairly ironic service to the government: spotting rogue employees.

Fuente: NSA Theft Suspect Worked For Contractor That Sells the Government Tech for Spotting Rogue Employees


NSA contractor arrested for alleged theft of top secret classified information | US news | The Guardian

Shares183Save for laterThe FBI has arrested a National Security Agency contractor on suspicion of the theft of top secret classified data and documents in an alleged security breach at the same intelligence agency whose spy secrets were exposed by Edward Snowden.

Fuente: NSA contractor arrested for alleged theft of top secret classified information | US news | The Guardian


El MI6 contratará casi mil espías para combatir el terrorismo – El Mostrador

Según afirmaciones de Younger publicadas por The Times el mundo digital “representa una amenaza porque los que se oponen a nosotros pueden utilizar esta capacidad para tener acceso a nuestras actividades, lo que significa que tenemos que cambiar completamente la forma en que hacemos las cosas”.

Fuente: El MI6 contratará casi mil espías para combatir el terrorismo – El Mostrador


Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas

Un grupo de hackers vinculado a la Agencia de Seguridad Nacional de los Estados Unidos, mejor conocida como la NSA (National Security Agency), ha sido hackeado recientemente y sus herramientas de espionaje, recolección de información, malware y más, han sido puestas en venta por 1 millón de bitcoins (más de 550 millones de dólares al momento de la publicación).

Fuente: Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas


¿Son estas las armas de espionaje de la NSA? | Derechos Digitales

Un grupo de hackers dice haber obtenido información confidencial de Equation Group, un conocido y sofisticado grupo de ciber atacantes ligado a la NSA. Parte de la información publicada permite por primera vez echar un vistazo a las herramientas utilizadas por la agencia de seguridad estadounidense.

Fuente: ¿Son estas las armas de espionaje de la NSA? | Derechos Digitales


Bulk data collection vital to prevent terrorism in UK, report finds | World news | The Guardian

The bulk collection of personal data by British spy agencies is vital in preventing terrorist attacks, an independent review of draft security legislation has found.David Anderson QC, the independent reviewer of terrorism legislation, concluded that laws giving MI5, MI6 and GCHQ the right to gather large volumes of data from members of the public had a “clear operational purpose”.

Fuente: Bulk data collection vital to prevent terrorism in UK, report finds | World news | The Guardian


Falta de limites sobre balões vigilantes nas Olimpíadas põe privacidade da população em xeque – Gizmodo Brasil

Diante deste cenário, o país tem se esforçado em mostrar que é seguro com a prisão de suspeitos de terrorismo, o aumento de contingente de forças de ordem recrutadas para jogos — são milhares de policiais, soldados do exército e da guarda nacional — e também com o uso da tecnologia. Um dos destaques é a aquisição de quatro balões de vigilância comprados pelo governo do Rio de Janeiro.

Fuente: Falta de limites sobre balões vigilantes nas Olimpíadas põe privacidade da população em xeque – Gizmodo Brasil


America’s broken digital copyright law is about to be challenged in court | Technology | The Guardian

The Electronic Frontier Foundation is suing the US government over ‘unconstitutional’ use of the Digital Millennium Copyright Act

Fuente: America’s broken digital copyright law is about to be challenged in court | Technology | The Guardian


Filtrada World-Check, la base de datos usada por Gobiernos y bancos con sospechosos de terrorismo

La base de datos contendría 2.240.000 entradas con categorías como “individuo político”, “corporativo”, “militar”, “Crimen-narcóticos” y “terrorismo”. Estos datos estarían siendo utilizados por más de 300 gobiernos y agencias de inteligencia, nueve de los diez mejores bufetes de abogados o 49 de los 50 bancos más grandes del mundo. En total, se estima que son 6.000 clientes los que la utilizan en 170 países.

Fuente: Filtrada World-Check, la base de datos usada por Gobiernos y bancos con sospechosos de terrorismo


The riff: Taking away the internet does not make you safe – FT.com

Around the world, computers controlling critical infrastructure such as nuclear power stations are isolated from the internet. In Singapore, however, the government has taken security a step further by imposing an “air gap” on the entire public sector.From May next year, Singapore’s civil servants will no longer have direct access to the web from their work computers.

Fuente: The riff: Taking away the internet does not make you safe – FT.com


Take that, FBI: Apple goes all in on encryption | Technology | The Guardian

The new feature is just the latest move towards more widespread encryption in consumer technology products following Apple’s standoff with the FBI earlier in 2016, in which it refused to help the agency weaken its own security processes to access information on an iPhone belonging to a terrorist. Facebook and Google both pledged support for Apple during the fight, and both are subsequently reported to be planning encrypted versions of their messaging apps.

Fuente: Take that, FBI: Apple goes all in on encryption | Technology | The Guardian


San Bernardino iPhone: US ends Apple case after accessing data without assistance | Technology | The Guardian

With the court filing, Silicon Valley and Washington are poised to return to a cold war over the balance between privacy and law enforcement in the age of apps

Fuente: San Bernardino iPhone: US ends Apple case after accessing data without assistance | Technology | The Guardian


Government keeping its method to crack San Bernardino iPhone ‘classified’ | Technology | The Guardian

Revealed: After postponing a court hearing with Apple, the FBI is testing a new technique which Apple says they will pressure government to reveal

Fuente: Government keeping its method to crack San Bernardino iPhone ‘classified’ | Technology | The Guardian


FBI may have found way to unlock San Bernardino shooter’s iPhone without Apple | Technology | The Guardian

Federal authorities have cancelled Tuesday’s court hearing with Apple, saying an ‘outside party’ has shown a potential way to crack Syed Farook’s phone

Fuente: FBI may have found way to unlock San Bernardino shooter’s iPhone without Apple | Technology | The Guardian


Forget Apple's fight with the FBI – our privacy catastrophe has only just begun | Technology | The Guardian

The privacy crisis is a disaster of our own making – and now the tech firms who gathered our data are trying to make money out of privacy

Fuente: Forget Apple’s fight with the FBI – our privacy catastrophe has only just begun | Technology | The Guardian


Facebook, Google and WhatsApp plan to increase encryption of user data | Technology | The Guardian

Spurred on by Apple’s battles against the FBI, some of tech’s biggest names are to expand encryption of user data in their services, the Guardian can reveal

Fuente: Facebook, Google and WhatsApp plan to increase encryption of user data | Technology | The Guardian


Obama Wants Nonexistent Middle Ground on Encryption, Warns Against “Fetishizing Our Phones”

Obama’s first extended disquisition on the contentious issue of encryption suggests he’s only been listening to one side.

Fuente: Obama Wants Nonexistent Middle Ground on Encryption, Warns Against “Fetishizing Our Phones”


Snowden: FBI's claim it can't unlock the San Bernardino iPhone is 'bullshit' | Technology | The Guardian

NSA whistleblower rubbishes claims that only Apple can unlock killer’s iPhone 5C, indicating FBI has the means itself

Fuente: Snowden: FBI’s claim it can’t unlock the San Bernardino iPhone is ‘bullshit’ | Technology | The Guardian


NSA Is Mysteriously Absent From FBI-Apple Fight

The Federal Bureau of Investigation insisted that it was helpless. The bureau told a judge in February that Apple has the “exclusive technical means” to try to unlock the contents of San Bernardino shooter Syed Rizwan Farook’s iPhone — and that’s why it should be forced to do so. But notably missing from the FBI’s argument was any mention of whether it had consulted spies and sleuths from the government’s intelligence community — particularly the National Security Agency. The Twitterverse exploded with q

Fuente: NSA Is Mysteriously Absent From FBI-Apple Fight


Apple gains support from tech rivals in FBI case – FT.com

ft.com > Companies >TechnologySubscribe Sign in Home World Companies Energy Financials Health Industrials Luxury 360 Media Retail & Consumer Tech Telecoms Transport By Region Tools Markets Global Economy Lex Comment Management Life & Arts March 4, 2016 2:25 amApple gains support from tech rivals in FBI caseTim Bradshaw in San Francisco Share Print Clip CommentsFBI and Apple logos©FBI/AppleAmerica’s largest technology companies have joined Apple’s fight against the government over data protection and security, in an unusual display of unity by the Silicon Valley rivals.More than a dozen motions filed on Thursday sided with Apple as it tries to resist a demand to write software that would help the FBI unlock the San Bernardino shooter’s iPhone. Civil liberties groups and IT trade associations lined up alongside dozens of law professors and cryptography experts, after Apple filed its own motion for the judicial order to be withdrawn last week.

Fuente: Apple gains support from tech rivals in FBI case – FT.com


Apple recurre la orden para dar acceso al FBI al móvil del terrorista de San Bernardino | Internacional | EL PAÍS

Cook reitera su negativa a crear un software que altere su sistema de encriptación. El buró dice que este caso no sentaría precedentes

Fuente: Apple recurre la orden para dar acceso al FBI al móvil del terrorista de San Bernardino | Internacional | EL PAÍS


What has the FBI ordered Apple to do and why is it refusing? – FT.com

What has Apple been ordered to do?The US court has told Apple to write a piece of software that lowers an iPhone’s defences, enabling the FBI to use brute force to break in by bombarding the device with many possible passwords until it gets the right answer. The new tool would do three things:

Fuente: What has the FBI ordered Apple to do and why is it refusing? – FT.com


N.Y. judge backs Apple in encryption fight with government | Reuters

The U.S. government cannot force Apple Inc (AAPL.O) to unlock an iPhone in a New York drug case, a federal judge in Brooklyn said on Monday, a ruling that bolsters the company’s arguments in its landmark legal showdown with the Justice Department over encryption and privacy.

Fuente: N.Y. judge backs Apple in encryption fight with government | Reuters


Apple vs. FBI: Cuando las compañías hacen activismo | Hiperderecho

Durante la semana pasada se ha dicho y escrito mucho sobre la orden judicial que ordena a Apple colaborar con el FBI para acceder a los datos del iPhone de uno de los autores de la masacre de San Bernardino. La negativa de Tim Cook, CEO de la compañía, ha sido apoyada y criticada desde …

Fuente: Apple vs. FBI: Cuando las compañías hacen activismo | Hiperderecho


Fundación País Digital inicia búsqueda de proyectos para mejorar Santiago – El Mostrador

Como parte de las acciones impulsadas por la Fundación País Digital, este viernes se abrió el proceso de licitación para el Diseño de Hoja de Ruta del Programa Estratégico Regional Santiago Ciudad Inteligente.Se trata de una iniciativa de la Dirección Regional Metropolitana de Corfo que busca activar y articular la generación de soluciones utilizando las Tecnologías de la Información y la Comunicación (TIC), en torno a los ejes de movilidad, seguridad, y medio ambiente.

Fuente: Fundación País Digital inicia búsqueda de proyectos para mejorar Santiago – El Mostrador


EFF, ACLU, and Amnesty International voice support for Apple in FBI battle | The Verge

The American Civil Liberties Union (ACLU), Electronic Frontier Foundation (EFF), and Amnesty International have come out in support of Apple, after the company said it would contest a judge’s order to unlock an iPhone used by one of the San Bernardino shooters.

Fuente: EFF, ACLU, and Amnesty International voice support for Apple in FBI battle | The Verge


Apple’s FBI Battle Is Complicated. Here’s What’s Really Going On | WIRED

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and also generated some misinformation.  In the interest of clarifying the facts and correcting some misinformation, we’ve pulled together a summary of the issues at hand.

Fuente: Apple’s FBI Battle Is Complicated. Here’s What’s Really Going On | WIRED


We cannot trust our government, so we must trust the technology | US news | The Guardian

Apple’s battle with the FBI is not about privacy v security, but a conflict created by the US failure to legitimately oversee its security service post Snowden

Fuente: We cannot trust our government, so we must trust the technology | US news | The Guardian


Bill Gates backs FBI in battle with Apple over San Bernardino killer's phone | Technology | The Guardian

US government is asking for a particular case, and Apple should comply, says Microsoft co-founder Gates

Fuente: Bill Gates backs FBI in battle with Apple over San Bernardino killer’s phone | Technology | The Guardian


Hillary Clinton and Bernie Sanders Refuse to Choose Between Apple and the FBI

Both candidates tried to occupy a middle ground that doesn’t really exist – either in the war between Apple and the FBI, or when it comes to the spread of unbreakable encryption.

Fuente: Hillary Clinton and Bernie Sanders Refuse to Choose Between Apple and the FBI


FBI Says Apple Court Order Is Narrow, But Other Law Enforcers Hungry to Exploit It

The Justice Department says Apple can destroy the hacking software it makes after it’s used once. But other law enforcers are already lining up to use it themselves.

Fuente: FBI Says Apple Court Order Is Narrow, But Other Law Enforcers Hungry to Exploit It


Exclusive: Snowden intelligence docs reveal UK spooks' malware checklist / Boing Boing

Boing Boing is proud to publish two original documents disclosed by Edward Snowden, in connection with “Sherlock Holmes and the Adventure of the Extraordinary Rendition,” a short story …

Fuente: Exclusive: Snowden intelligence docs reveal UK spooks’ malware checklist / Boing Boing


FireEye bulks up for ‘cyber arms race’ – FT.com

FireEye, a cyber security company, has bought threat intelligence start-up iSight Partners, as it seeks to compliment its machine learning with data gathered by humans who watch hackers in the darkest corners of the internet. With the acquisition,

Fuente: FireEye bulks up for ‘cyber arms race’ – FT.com


¿Tienen las municipalidades más facultades que el Ministerio Público? – Derechos Digitales

A mediados de octubre de 2015, la prensa chilena daba cuenta de la instalación de dos globos aerostáticos en la comuna de Las Condes y uno en Lo Barnechea, supuestamente destinados a incrementar los niveles de seguridad de los habitantes de ambos municipios y a colaborar en la gestión del tránsito de sus calles.

Se trata de tecnología de origen militar: potentes cámaras que flotan sobre las comunas, equipadas con lentes de gran alcance, capaces de efectuar seguimientos en un radio de 3 kilómetros, operadas por una empresa privada y no por funcionarios públicos.

Fuente: ¿Tienen las municipalidades más facultades que el Ministerio Público? – Derechos Digitales

A mediados de octubre de 2015, la prensa chilena daba cuenta de la instalación de dos globos aerostáticos en la comuna de Las Condes y uno en Lo Barnechea, supuestamente destinados a incrementar los niveles de seguridad de los habitantes de ambos municipios y a colaborar en la gestión del tránsito de sus calles.

Se trata de tecnología de origen militar: potentes cámaras que flotan sobre las comunas, equipadas con lentes de gran alcance, capaces de efectuar seguimientos en un radio de 3 kilómetros, operadas por una empresa privada y no por funcionarios públicos.

Fuente: ¿Tienen las municipalidades más facultades que el Ministerio Público? – Derechos Digitales


Comey Calls on Tech Companies Offering End-to-End Encryption to Reconsider “Their Business Model”

The FBI director essentially wants tech companies to roll back secure encryption to something less secure that law enforcement can intercept.

Fuente: Comey Calls on Tech Companies Offering End-to-End Encryption to Reconsider “Their Business Model”