Intelligence

Utah systems experiences 300k hacking attacks a day due to the presence of the NSA Data Center

The representatives of the Utah State confirmed that their systems experiences 300,000 hacking attacks a day due to the presence…

10 years ago

A sophisticated variant of OceanLotus trojan targets OS X systems

In May 2015, the Chinese security firm Qihoo 360 published a report on a Trojan called OceanLotus that was being…

10 years ago

GCHQ helped US in developing Stuxnet, claims a documentary

A new documentary titled Zero Days revealed that the Stuxnet cyber weapon was just a small part of a much…

10 years ago

Linux Fysbis Trojan, a new weapon in the Pawn Storm’s arsenal

Malware researchers at PaloAlto discovered the Fysbis Trojan, a simple and an effective Linux threat used by the Russian cyberspy…

10 years ago

The IPT ruled that GCHQ spies can legally hack any electronic devices

The British Intelligence Agency GCHQ has a license to hack computers and devices, the UK's Investigatory Powers Tribunal (IPT) ruled. This…

10 years ago

BlackEnergy infected also Ukrainian Mining and Railway Systems

Experts at Trend Micro discovered strains of BlackEnergy malware involved in the recent attacks against Ukrainian Mining and Railway Systems.…

10 years ago

The FBI requests $38 Million to counter the threat of Going Dark

The FBI requests $38 Million to counter the threat of Going Dark, in particular asking more economic resources to break…

10 years ago

US Intelligence confirms the ISIS used chemical weapons

According to Fox News, the Director of National Intelligence confirmed to the Senate that the Islamic State has used chemical…

10 years ago

Global and Modern Terrorism/Cyber Terrorism

In the following brief I will describe kinetic plot based modern terrorism/Cyber-terrorism and religious affiliations. Both Jihadist and Non-Jihadist, organized…

10 years ago

US and UK mutual agreement on wiretap orders and search warrants

The US and UK authorities are working on a secret agreement that would allow a mutual access to data of…

10 years ago

This website uses cookies.