Intelligence

Pierluigi Paganini June 10, 2015
Belgian authorities detained terrorists by intercepting WhatsApp messages

Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group. According to a report published by Bloomberg, two men were arrested and warrants were issued for other three suspects that were allegedly preparing a terrorist attack in Belgium. The interesting part of the news is that law […]

Pierluigi Paganini June 10, 2015
ISIS Book of Terror for Wi-Fi Hacking and the use of spy tools

ISIS supporters are spreading online a collection of tutorial titled the Book of Terror to teach how Hack a Wi-FI network and which are main spying tools. ISIS militants are spreading a small package, titled Book of Terror, containing data of various spy tools, as well as tutorials on how to hack Wi-Fi networks in […]

Pierluigi Paganini June 07, 2015
PunkSPIDER, the crawler that scanned the Dark Web

Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. We have discussed several times about the Tor anonymizer network and the way it is exploited  by criminal crews to sell any kind of illegal product and service. Last week, an automated scanner dubbed PunkSPIDER was launched in the […]

Pierluigi Paganini June 07, 2015
US Air Force located an ISIS command by analyzing a selfie

The US Air Force bombed an ISIS HeadQuarter after tracking location through the analysis of the imaged posted on social media platforms. ISIS members make professional use of social media for propaganda and to recruit new sympathizers, but intelligence agencies are trying to exploit every little mistake to track down the terrorist cells. Air Force […]

Pierluigi Paganini June 07, 2015
Security Affairs newsletter Round 12 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Yemen Cyber Army will release 1M of records per week to stop Saudi Attacks The Importance of Operational Security and User Education CIA Chief: Ending NSA Spying Would Boost […]

Pierluigi Paganini June 06, 2015
A report shows that the NSA is in a search for hackers

The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, what does it means for Americans? The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, where the NSA is able to spy internet traffic in search […]

Pierluigi Paganini June 05, 2015
Chinese hackers had access to millions records of US workers

US Government announced that a major data breach likely backed by Chinese hackers caused the exposure of data belonging to millions of government workers. Once again a data breach interested systems of the US government, the Obama administration on Thursday confirmed to have been the victim of a major cyber attack. According to the US […]

Pierluigi Paganini June 04, 2015
Are Russian hackers behind the Bundestag cyber attack?

Security experts involved in investigation on the attack against the Bundestag suspect that the hack was part of a large-scale espionage campaign backed by the Kremlin. Last month, the German Bundestag suffered a serious cyber attack by unknown hackers, in the days following the incident the German parliament officially confirmed media reports about a hacking […]

Pierluigi Paganini June 04, 2015
Thamar Reservoir – Iranian hackers target entities in Middle East

Security experts at ClearSky have published a report on the a cyber espionage campaign dubbed Thamar Reservoir that is targeting entities in the Middle East. Security experts at ClearSky have uncovered a cyber espionage campaign dubbed Thamar Reservoir due to the name of its target Thamar E. Gindin. The investigation led the experts to date the Thamar Reservoir […]

Pierluigi Paganini June 04, 2015
The FBI is not able to monitor ISIS’s encrypted communications

The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS, it urges a law to give them more powers. The FBI warned lawmakers there was no way to monitor encrypted online communications exploited by Islamic State militants and sympathizers. The law enforcement urges IT giants to provide […]