Intelligence

Pierluigi Paganini March 01, 2015
Indian Government bans third party email services, including Gmail and Yahoo

The Indian Government bans third party email services, including Gmail and Yahoo, from its offices in order to protect government communications. The Indian government will be monitoring the online activities of official computers, blocking any content not comply with its policy. The authorities will intimate users and, as an ultimate measure, will have the right […]

Pierluigi Paganini February 26, 2015
Doubts about how CSE monitors Canadian emails to the Government

New secret documents leaked by Snowden reveal that CSE monitors millions of Canadian emails to Government, but privacy advocates criticized how CSE does it. Privacy advocates and Canadians are worried by the last bunch of document leaked by Edward Snowden related to the surveillance activities conducted by the Canadian Security Establishment (CSE). The national broadcaster Canadian […]

Pierluigi Paganini February 26, 2015
SIM Maker Gemalto Confirms cyber attacks, but excludes key theft

SIM maker Gemalto confirmed that unknown hackers targeted its systems in the period indicated by Snowden, but denied any massive theft of encryption keys. Just a week ago, the media agencies spread the news that US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile […]

Pierluigi Paganini February 24, 2015
NSA Director Rogers urges the creation a legal framework for the US authorities

The NSA Director Rogers urges the creation of an independent legal framework to regulate the operations conducted US authorities. The NSA director and commander of U.S. Cyber Command, Admiral Michael Rogers, told a Washington cybersecurity forum that legislators need the creation of a legal framework to regulate the operations conducted by law enforcement and intelligence-gathering organizations worldwide. […]

Pierluigi Paganini February 23, 2015
CyberCriminals and their APT and AVT Techniques

The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat) . Cybercriminals and their techniques in the APT and AVT attacks “APT is an attack in the persistent memory that resides in the victims machine without getting noticed and the attacker exfiltrates sensitive information from […]

Pierluigi Paganini February 23, 2015
US State Department – Hackers still in the Email System

Three months from the incursion in the network of the U.S. State Department e-mail system, US specialists are still working to secure the networks. In November 2014 the State Department has taken the unprecedented step of shutting down its entire unclassified email system in response to a suspected cyber attack. ‘Activity of concern’ was detected in the […]

Pierluigi Paganini February 23, 2015
US Government Has Developed a Manhattan Project for Cyber Attacks, Rather than For Defensive Purposes

A cyber Manhattan Project seems to have been on the move for over a decade, providing the US with a great advantage related to online surveillance. Despite belief, no defensive purposes have triggered its setting up. Everybody recalls the notorious Manhattan Project at the end of World War II, which has resulted in the development […]

Pierluigi Paganini February 20, 2015
Great SIM Heist – docs reveal mass cell phone hack by Five Eyes intelligence

US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile voice and data communications worldwide. A new report published by The Intercept reveals that the National Security Agency and the British counterpart GCHQ obtained encryption keys of the global SIM manufacturer Gemalto, but the company […]

Pierluigi Paganini February 17, 2015
The Equation Group shows most complex and sophisticated hacking techniques ever seen

Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of hacking techniques. Security experts at Kaspersky revealed the existence of a hacking group operating since 2001 that targeted practically every industry with  sophisticated zero-day malware. According to a new report from Kaspersky Lab, this group, dubbed […]

Pierluigi Paganini February 16, 2015
Law enforcement speculates that ISIS is already using Bitcoin

Law enforcement investigating on terrorism and speculate that terrorists including ISIS members already use Bitcoin and other virtual currencies. The ISIS continues to threaten the world, the group is growing in popularity and its operations are increasingly bloody. ISIS has an efficient organizational capability, its strategy of terror is allowing to broaden its reach, and news of the last […]