Which are the main events observed in the darkweb during the 2015 and what to expect in the next 12 months? The DarkWeb is a set of publicly accessible content that are hosted on websites whose IP address is hidden, but to which anyone can access it as long as it knows the address. The […]
The Tel Aviv-based Rayzone Group is offering for sale a gadget called InterApp that can intercept and exfiltrate information from nearby smartphones. InterApp is a device designed by the Israeli Rayzone Group that can spy on any smartphone. “InterApp system enables to get intimate information of any phone user, which is in the systemâs ,proximity. The collected […]
An investigation revealed that some Turkish officers on the Syrian border have communicated with terrorists of the ISIS in Syria. According to a report published by the Turkey’s Cumhuriyet daily,  Turkish authorities are in communication with members of the dreaded members of the Islamic State. The report cites an investigation by the Ankara Chief Prosecutor’s […]
Who planted the Authentication Backdoor in the Juniper ScreenOS? Security experts are making their speculation, but interesting revelations are coming out. While the FBI is investigating the case searching for responsible for the introduction of a backdoor in a number of Juniper network devices, a number of speculation are circulating on the Internet.  Juniper Networks is a […]
Iranian hackers penetrated the industrial control system of a dam near New York City in 2013, raising concerns about the security of US critical infrastructure. It is official, Iranian hackers violated the online control system of a New York dam in 2013. According to reports, the hackers penetrated the control system of the dam and poked around […]
Security experts at FireEye have uncovered a spear phishing campaign managed by Chinese hackers that is targeting Taiwan Opposition and Media ahead of the vote in January. According to FireEye a group of Chinese hackers is targeting Taiwan’s opposition party and journalists, security experts and officials. The attacks are occurring weeks away from a Taiwanese presidential […]
At tonightâs Democratic national debate Hillary Clinton Hillary Clinton calls tech companies to work on a new Manhattan Project for Encryption. At tonightâs Democratic national debate Hillary Clinton calls tech companies cooperate to create âa Manhattan-like project.â The US Government is expressing its concerns about the possible misuses of encryption that today represents a serious obstacle […]
The FBI is investigating on the unauthorized code found in the operating system running on firewalls sold by Juniper Networks. The FBI confirmed that is investigating on the alleged breach of Juniper Networks VPN software that resulted in the introduction of unauthorized code in the OS running on Juniper firewalls. Juniper Networks makes communications equipment for enterprises […]
An operating system running on firewalls sold by Juniper Networks contains unauthorized code that could be exploited to decrypt traffic sent through virtual private networks. An âunauthorized codeâ was discovered in the operating system for Juniper NetScreen firewalls. The company admitted the presence of the âunauthorized codeâ that could allow an attacker to decrypt VPN traffic. [âunauthorized codeâ] âcould allow […]
Someone in the Intelligence community leaked online a secret catalog of cellphone spying devices used by law enforcement. The Intercept has leaked online a secret catalog of cellphone spying devices, the precious document has been given to the online publication by someone inside the intelligence community. The person who passed the document to The Intercept […]