Passionate about Entrepreneurship, Business Psychology, Digital Culture, Graphic Design, Web Development and last but not least IT-Security.

Surveillance Methods - Lawful Interception, Monitoring, Deep Packet Inspection, Data Analysis, Hacking

The Surveillance Catalog - Where governments get their tools http://projects.wsj.com/surveillance-catalog/

Document Trove Exposes Surveillance Methods http://on.wsj.com/uvOTrp

Comments

Was Stuxnet the first attack of this kind or only the first one detected? Well, at least the first that has received so much attention from researchers and media around the world and hopefully increased the awareness of this known issue among the public.



While all the details in the video are not technically accurate, it’s still worth watching." ~F-Secure

Stuxnext (HUNGRY BEAST) (by abchungrybeast)

Comments