Security experts at FireEye have uncovered a spear phishing campaign managed by Chinese hackers that is targeting Taiwan Opposition and Media ahead of the vote in January. According to FireEye a group of Chinese hackers is targeting Taiwan’s opposition party and journalists, security experts and officials. The attacks are occurring weeks away from a Taiwanese presidential […]
At tonightâs Democratic national debate Hillary Clinton Hillary Clinton calls tech companies to work on a new Manhattan Project for Encryption. At tonightâs Democratic national debate Hillary Clinton calls tech companies cooperate to create âa Manhattan-like project.â The US Government is expressing its concerns about the possible misuses of encryption that today represents a serious obstacle […]
The FBI is investigating on the unauthorized code found in the operating system running on firewalls sold by Juniper Networks. The FBI confirmed that is investigating on the alleged breach of Juniper Networks VPN software that resulted in the introduction of unauthorized code in the OS running on Juniper firewalls. Juniper Networks makes communications equipment for enterprises […]
An operating system running on firewalls sold by Juniper Networks contains unauthorized code that could be exploited to decrypt traffic sent through virtual private networks. An âunauthorized codeâ was discovered in the operating system for Juniper NetScreen firewalls. The company admitted the presence of the âunauthorized codeâ that could allow an attacker to decrypt VPN traffic. [âunauthorized codeâ] âcould allow […]
Someone in the Intelligence community leaked online a secret catalog of cellphone spying devices used by law enforcement. The Intercept has leaked online a secret catalog of cellphone spying devices, the precious document has been given to the online publication by someone inside the intelligence community. The person who passed the document to The Intercept […]
The British intelligence agency GCHQ has released the Gaffer database as an open source project. Gaffer is sort of database written in Java that makes it “easy to store large-scale graphs in which the nodes and edges have statistics such as counts, histograms and sketches.”, its code is available for download on the code-sharing website Github. “Gaffer is […]
Cyber terrorists can target UK infrastructure, with the odds being in favor of targeting the power grid, rather than the Internet broadband network. Cyber terrorists are probably going to target the UK and more specifically focus on something that will create chaos in the country. After the devastating incidents of Paris in November, many people […]
The Iranian Cyber police (FATA) is actively monitoring the activities of the Daesh terrorist group (ISIS) in the country. “Live by the sword, die by the sword,” Iranian hackers are intensifying their activities against the Western countries, recently security firms have uncovered several cyber espionage campaigns targeting US and European. organizations. In November, experts from […]
A new intelligence report shared with law enforcement warns of ISIS’ ability to create fake Syrian passports, it’s alarm. According to a report issued by the US intelligence, the ISIS has the ability to create fake Syrian passports, the news was confirmed this week by a federal official. The news was reported by the ABC […]
According to the French Prime Minister Valls the Government will not ban Public Wi-Fi or the Tor Network. Last week, documents leaked to Le Monde suggested that the French Government was planning to adopt drastic measures in response to the terrorist threat, including the ban of the Tor Network and curtail public Wi-Fi. According to an […]