Monthly Archive: December 2014

Current security efforts suffer from the flawed assumption that …

Current security efforts suffer from the flawed assumption that adequate security can be provided in applications with the existing security mechanisms of mainstream operating systems. S. Jeff Turner, John F. Farrell: The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments (National Security Agency) (View on gamamb.tumblr.com)

Codenamed AURORAGOLD, the covert operation has monitored the content …

Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks. Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide (View on gamamb.tumblr.com)