The Indian Government bans third party email services, including Gmail and Yahoo, from its offices in order to protect government communications. The Indian government will be monitoring the online activities of official computers, blocking any content not comply with its policy. The authorities will intimate users and, as an ultimate measure, will have the right […]
New secret documents leaked by Snowden reveal that CSE monitors millions of Canadian emails to Government, but privacy advocates criticized how CSE does it. Privacy advocates and Canadians are worried by the last bunch of document leaked by Edward Snowden related to the surveillance activities conducted by the Canadian Security Establishment (CSE). The national broadcaster Canadian […]
SIM maker Gemalto confirmed that unknown hackers targeted its systems in the period indicated by Snowden, but denied any massive theft of encryption keys. Just a week ago, the media agencies spread the news that US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile […]
The NSA Director Rogers urges the creation of an independent legal framework to regulate the operations conducted US authorities. The NSA director and commander of U.S. Cyber Command, Admiral Michael Rogers, told a Washington cybersecurity forum that legislators need the creation of a legal framework to regulate the operations conducted by law enforcement and intelligence-gathering organizations worldwide. […]
The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat) . Cybercriminals and their techniques in the APT and AVT attacks âAPT is an attack in the persistent memory that resides in the victims machine without getting noticed and the attacker exfiltrates sensitive information from […]
Three months from the incursion in the network of the U.S. State Department e-mail system, US specialists are still working to secure the networks. In November 2014 the State Department has taken the unprecedented step of shutting down its entire unclassified email system in response to a suspected cyber attack. ‘Activity of concern’ was detected in the […]
A cyber Manhattan Project seems to have been on the move for over a decade, providing the US with a great advantage related to online surveillance. Despite belief, no defensive purposes have triggered its setting up. Everybody recalls the notorious Manhattan Project at the end of World War II, which has resulted in the development […]
US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile voice and data communications worldwide. A new report published by The Intercept reveals that the National Security Agency and the British counterpart GCHQ obtained encryption keys of the global SIM manufacturer Gemalto, but the company […]
Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of hacking techniques. Security experts at Kaspersky revealed the existence of a hacking group operating since 2001 that targeted practically every industry with sophisticated zero-day malware. According to a new report from Kaspersky Lab, this group, dubbed […]
Law enforcement investigating on terrorism and speculate that terrorists including ISIS members already use Bitcoin and other virtual currencies. The ISIS continues to threaten the world, the group is growing in popularity and its operations are increasingly bloody. ISIS has an efficient organizational capability, its strategy of terror is allowing to broaden its reach, and news of the last […]