A new interesting report published by The Intercept details the effort spent by the US intelligence to compromise the security of Apple devices. The Intercept published another disconcerting post on the US Intelligence campaign aimed to steal the secrets of the IT giant Apple. According to top-secret documents disclosed by The Intercept a team of researchers working with the Central […]
A new collection of documents leaked by Edward Snowden shines light on shadowy New Zealand surveillance activities operated at the Waihopai Base. A new collection of documents leaked by Edward Snowden provides an interesting analysis of the relationship between the Five Eyes countries and the surveillance activities they managed. The documents published Saturday by the […]
After Babar malware, security researchers detected a new strain of malware dubbed Casper that appears to be linked to the France Intelligence. Surveillance is the primary goal of Intelligence Agencies worldwide, a few weeks ago cyber security researchers detected a new malware, dubbed Babar, that is considered a product of the French intelligence. According to the […]
The Indian Government bans third party email services, including Gmail and Yahoo, from its offices in order to protect government communications. The Indian government will be monitoring the online activities of official computers, blocking any content not comply with its policy. The authorities will intimate users and, as an ultimate measure, will have the right […]
New secret documents leaked by Snowden reveal that CSE monitors millions of Canadian emails to Government, but privacy advocates criticized how CSE does it. Privacy advocates and Canadians are worried by the last bunch of document leaked by Edward Snowden related to the surveillance activities conducted by the Canadian Security Establishment (CSE). The national broadcaster Canadian […]
SIM maker Gemalto confirmed that unknown hackers targeted its systems in the period indicated by Snowden, but denied any massive theft of encryption keys. Just a week ago, the media agencies spread the news that US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile […]
The NSA Director Rogers urges the creation of an independent legal framework to regulate the operations conducted US authorities. The NSA director and commander of U.S. Cyber Command, Admiral Michael Rogers, told a Washington cybersecurity forum that legislators need the creation of a legal framework to regulate the operations conducted by law enforcement and intelligence-gathering organizations worldwide. […]
The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat) . Cybercriminals and their techniques in the APT and AVT attacks âAPT is an attack in the persistent memory that resides in the victims machine without getting noticed and the attacker exfiltrates sensitive information from […]
Three months from the incursion in the network of the U.S. State Department e-mail system, US specialists are still working to secure the networks. In November 2014 the State Department has taken the unprecedented step of shutting down its entire unclassified email system in response to a suspected cyber attack. ‘Activity of concern’ was detected in the […]
A cyber Manhattan Project seems to have been on the move for over a decade, providing the US with a great advantage related to online surveillance. Despite belief, no defensive purposes have triggered its setting up. Everybody recalls the notorious Manhattan Project at the end of World War II, which has resulted in the development […]