Law enforcement at European Union is working on ethical hacking proposal that will allow them to remotely access and monitor any PC without warrant. This is adopted after a decision by the European Union’s council of ministers in Brussels. The move will allow MI5 officers, French, German and other EU forces to ask British officers to hack into someone’s computer in your home, hotel or your business without any warrant. Authorities could break into PCs and install key loggers, malware or some sort of spyware to trap all the communications.

An amendment to the Computer Misuse Act 1990 made ethical hacking legal and is possible since 1994, but such intrusive surveillance was closely regulated under the Regulation of Investigatory Powers Act.

Opposition MPs and civil liberties groups have raised concerns over the move.

Explore More

What are the security holes in the Basic Authentication scheme?

The Basic Authentication scheme uses the username and password and encrypts the password using base64 encoding. In spite of this, there are still many security holes in the Basic Authentication

Tracing a hacker

> Tracing a hacker > Written by: Paperghost [[email protected]] > 24/02/2005 Sometimes, it’s just not enough to simply know that there’s a Trojan or Virus onboard. Sometimes you need to

Investigate Google’s Gmail, Docs and other products: EPIC Petitions to FTC

Electronic Privacy Information Center (EPIC) a privacy group based in Washington, D.C filed a petition to Federal trade commission to investigate the Google’s cloud computing offerings. They asked FTC to