The Data âcrown jewelsâ on global Cyber Risk: New scenarios of Cyber-politics to debate on surveillance versus privacy After two-year, stop-and-go legislative effort on the controversy of section 215 of the Patriot Act, the American Senate voted in plenary 77-to-17 on Sunday-night to move a House bill forward to object political conflict on surveillance vs. […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. The Phantom Menace, who targeted the oil tankers? Hi-tech car thieves use ÂŁ30 jamming devices in car parks Researcher who exploits bug in Starbucks gift cards gets rebuke, not […]
The Internal Revenue Service (IRS) was breached by hackers that “used an online service provided by the agency” to access data for more than 100,000 taxpayers. According to the Associated Press, the Internal Revenue Service (IRS) suffered a data breach, hackers “used an online service provided by the agency” to access data for more than 100,000 taxpayers. The […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hiring hackers, how much is it? US SOCOM and The Special Forces to Scrutinize Social media Skynet, the US top-secret program to track terrorists PHP hash comparison flaw is […]
The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user privacy and anonymity. The Debian-based distribution Tails, âThe Amnesiac Incognito Live System,âversion 1.4Â is available online! Tails is a popular live operating system (that means that users can start it on almost any computer from removable […]
Tor Browser 4.5 released! It comes with many improvements for security, privacy and usability. Download it to protect your online privacy. Are you a frequent visitor of the deep web? Is the Tor Network a necessity for your online anonymity? You must download the new release for the Tor Browser, Tor Browser 4.5, that was designed with a […]
Foreign hackers are targeting background investigation databases to blackmail US government personnel or to try to bribe them. It is not a mystery that Chinese hackers continuously target US companies and government offices, the attackers usually backed by the Government of Bejing mainly run cyber espionage campaigns to steal intellectual property and any kind of information related to person […]
Encryption has been used by more people over time and this has led to the NSA and the US Government to suggest new ways of accessing encrypted content. The uprising course of encryption and the fact that its use has become a lot more frequent and continues on increasing in popularity has made the United States wonder how they […]
Experts at Trustev discovered on the Nucleus black market lifetime subscriptions to popular streaming services and fake NYPD badges. In the last months, we have assisted numerous operations run by law enforcement against illegal activities in the dark web, in particular against the numerous black markets that sell any kind of product and services. Everyone could […]
The British television host scored a rare one-on-one interview in Moscow with Edward Snowden for the Sunday’s edition of the “John Oliver Tonight” show. A British channel hosted a rare interview with Snowden in Moscow, the interview was conducted by John Oliver from “John Oliver Tonight.” Aside from jokes like “Do you miss a hot […]