According to a report published by the experts at root9B the hacking crew APT28 is planning to attack several financial institutions worldwide. In October 2014, security expert at FireEye published a report on the activities conducted by a group of Russian hackers, dubbed APT28, the hacking crew is behind long-running cyber espionage campaigns that targeted US defense contractors, European security organizations and […]
Google Hangouts doesnât implement end-to-end encryption, when users message or talk with someone on Hangoutsis exposing to Government Wiretapping. Edward Snowden has revealed how the US intelligence spy on communication worldwide, despite the market is offering solutions that promise to be âNSA-surveillance proofâ the majority of people still use messaging apps like iMessage or Google […]
The United States Secretary of Homeland Security explained that the terrorism has entered a “new phase” and fears an escalation. The terrorism is probably the first concern for the US Government, the Americans fears a possible and imminent attack on the US soil. In an interview with ABC News, Jeh Johnson, the current United States Secretary of […]
Snowden revealed the existence of Skynet, a system designed by the NSA for online monitoring of terrorists and suspects through metadata analysis. Skynet is a real system designed by the NSA for online monitoring through metadata analysis, this is the last revelation made by the journalist Glenn Greenwald through the website The Intercept. The Intercept revealed the existence of a secret program called Skynet, […]
US SOCOM admitted that Counter-Terrorism Special Forces scrutinize FaceBook and other social media to handle potentially useful information. Exactly two years ago I wrote about the use of social media in the Military. I explained why social media platforms represent a powerful instrument for activities operated by governments and intelligence agencies. Modern social media networks are actively used by […]
A new collection of documents leaked by Snowden revealed how the US intelligence converts spoken conversation in indexable text with RHINEHART and VoiceRT tools. Following the disclosure of Top-secret documents provided by Edward Snowden everyone is aware of the risks of using any sort of communications methods, what was once private now it isnât anymore, […]
Experts at Trustwave observed a group of cyber criminals helping spread pro-Russia propaganda by inflating video views with a malvertising campaign. Security experts at Trustwave have discovered a botnet, originally designed for malvertising purpose, used redirect unaware users to view some pro-Russian videos on the website DailyMotion. The event is very interesting due to the political motivation […]
Foreign hackers are targeting background investigation databases to blackmail US government personnel or to try to bribe them. It is not a mystery that Chinese hackers continuously target US companies and government offices, the attackers usually backed by the Government of Bejing mainly run cyber espionage campaigns to steal intellectual property and any kind of information related to person […]
The Time revealed that Russian hackers have accessed President Barack Obama emails in the attack on the White House’s unclassified computer system. Earlier this month, US officials admitted there was a cyber “event” late last year, but refused to confirm reports Russia was behind the attack. New revelations on the attack against the unclassified network […]
The Dark Web email service SIGAINT suffered a major attack that involved 70  exit nodes, a circumstance that suggests Government operation. Law enforcement and Intelligence agencies are always involved in the infiltration of Darknets and related services with the primary intent to monitor bad actors and de-anonymize users. The Tor-Based Dark Web Email Service SIGAINT is one […]