Source: Shahid Abbasi, The News Tribe
Pakistan’s government has decided to establish a monitoring system of international incoming and outgoing calls along with voice and text communication of internet through International Clearing House (IHC).
Tag Archives: Mobile security
Source: Wanyama wa Chebusiri, BBC
Peter Marete, a second-hand clothes dealer in Kenya’s capital, Nairobi, is finding life very difficult without a mobile phone.
Source: Aman Sharma, Economic Times
The government is gearing up to arm cyber sleuths with forensic tools to catch up with criminals who outsmart investigators by using secure mobile phones or password-protected computers.
Source: John Markoff, The New York Times
A small team of cybersecurity researchers have lashed the computers together to form a homebrew computing cluster.
Source: MIT Technology Review
Robert Templeman at the Naval Surface Warfare Center in Crane, Indiana, and a few pals at Indiana University reveal an entirely new class of ‘visual malware’ capable of recording and reconstructing a user’s environment in 3D.
Source: Trustwave Spider Labs
A couple of weeks ago, Citizen Lab announced the discovery of the mobile component to the previously discovered FinFisher Toolkit.
The violence on Friday kept the nation spellbound and hooked to their television sets but despite the rampage it was a very quiet day for many. The reason for this was the blocked phone service.
Source: Tech Dirt
Police and security forces around the world — and that includes in the West — hate being recorded when they’re overstepping the mark in the execution of their duties, since it allows the public to challenge official accounts, and even to use videos to seek redress.
Source: Allie Bohm, ACLU
It’s been over a year since 35 ACLU affiliates filed over 380 public records requests with state and local law enforcement agencies seeking information about their policies, procedures, and practices for tracking cell phones.
A legal battle is brewing between technology companies and the U.S. government over whether law-enforcement agents have the right to obtain passwords to crack into smartphones of suspects.