Intelligence

Pierluigi Paganini June 02, 2015
Cyber-politics to debate on surveillance versus privacy

The Data “crown jewels” on global Cyber Risk: New scenarios of Cyber-politics to debate on surveillance versus privacy After two-year, stop-and-go legislative effort on the controversy of section 215 of the Patriot Act, the American Senate voted in plenary 77-to-17 on Sunday-night to move a House bill forward to object political conflict on surveillance vs. […]

Pierluigi Paganini June 02, 2015
Bundestag, the Government confirmed a data breach and data leaks

The German Government confirmed that hackers that attacked the Bundestag two weeks ago have had access to data of the German Parliament. The German Government has confirmed that hackers who breached the Bundestag systems a couple of weeks ago have also stolen data from targeted network. A spokeswoman for the Bundestag, Germany’s parliament, confirmed that unknown […]

Pierluigi Paganini May 31, 2015
Security Affairs newsletter Round 11 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. The Phantom Menace, who targeted the oil tankers? Hi-tech car thieves use ÂŁ30 jamming devices in car parks Researcher who exploits bug in Starbucks gift cards gets rebuke, not […]

Pierluigi Paganini May 30, 2015
US failed a Stuxnet-style attack against North Korea

New revelations came after a high-profile defector warns of that North Korea’s cyber army has the capability to run cyber attacks that could cause loss of human lives. According to an exclusive report by Reuters, The US was attempting without success to interfere with the nuclear programme of Pyongyang, in the same way it has done with Iran … SCADA systems […]

Pierluigi Paganini May 30, 2015
High-profile defector warns of North Korea cyber capabilities

A High-profile defector warns of that North Korea’s cyber army has the capability to run cyber attacks that could cause loss of human lives. Digital life and real existence increasingly overlap, cyber weapons are proof of that a threat originating from cyberspace can cause real and tangible damage as the loss of human lives. The BBC published […]

Pierluigi Paganini May 28, 2015
Mandrake, NSA identifies users based on how they type on their devices

According to a senior fellow for Lockheed IT, the National Security Agency has tested the use of smartphone-swipe recognition technology dubbed Mandrake. The NSA has developed a new technology, dubbed “Mandrake“, that can identify users from the way they swipe strokes and text on a smartphone screen. The news was reported by officials with Lockheed […]

Pierluigi Paganini May 26, 2015
Iran has foiled a cyber attack against the oil ministry

Iran – The Cyber Attacks Emergency Center in FATA has thwarted a major cyber attack  originated from US against the Oil Ministry. The Iranian Government announced that on Tuesday it had foiled a cyber-attack on the Islamic republic’s Oil Ministry. According to the Fars news agency, the Brigadier General Kamal Hadianfar, head of the cyber police, confirmed […]

Pierluigi Paganini May 24, 2015
Yemen Cyber Army hacked principal Saudi Gov networks

The group of hackers known as Yemen Cyber Army has hacked the computer systems at Saudi Arabia, they control also Interior Ministry and Defense Ministry. The group of hackers known as Yemen Cyber Army has hacked the computer systems at Saudi Arabia. The Hacking crew compromised the website, servers and databases belonging to the Saudi Arabia’s Foreign, […]

Pierluigi Paganini May 23, 2015
Astoria, the Tor client designed to beat the NSA surveillance

A team of security researchers announced to have developed Astoria, a new Tor client designed to beat the NSA and reduce the efficiency of timing attacks. Tor and Deep web are becoming terms even popular among Internet users, the use of anonymizing network is constantly increasing for this reason intelligence agencies are focusing their efforts in its monitoring. […]

Pierluigi Paganini May 22, 2015
The ISIS advances in the DeepWeb among Bitcoin and darknets

While members of the ISIS are continuing to explore the Deep Web for various activities, the US Intelligence plans activities to track them. The Dark Web is a privileged environment for cyber criminals and state-sponsored hackers due to the anonymity offered by its services. Unfortunately, another category of threat actors is exploiting the deep web, the terrorists, for […]