Law enforcement at European Union is working on ethical hacking proposal that will allow them to remotely access and monitor any PC without warrant. This is adopted after a decision by the European Union’s council of ministers in Brussels. The move will allow MI5 officers, French, German and other EU forces to ask British officers to hack into someone’s computer in your home, hotel or your business without any warrant. Authorities could break into PCs and install key loggers, malware or some sort of spyware to trap all the communications.

An amendment to the Computer Misuse Act 1990 made ethical hacking legal and is possible since 1994, but such intrusive surveillance was closely regulated under the Regulation of Investigatory Powers Act.

Opposition MPs and civil liberties groups have raised concerns over the move.

Explore More

What are the various Trojan vectors?

A Trojan may infect any system through Trojan vectors. The most common Trojan vectors are as follows: * Email attachments * Social engineering * NetBIOS remote installation * Physical access

EtterCap – ARP Spoofing And Beyond

When it comes to Network Security, my philosophy is – “You can’t afford to know less than the Hacker.” This means that in order to protect ourselves effectively, we need

Koobface; The Facebook virus. Latest in the list of social networking virus

Virus developers are still targeting social networking users to distribute the virus. The “friendly nature” of the social networking sites makes it easier to spread the worm quickly. Most users