A new collection of documents leaked by Snowden and disclosed by the Der Spiegel reveals the difficulties of Intelligence agencies to de-anonymize Tor users A new collection of NSA documents crawled by the Edward Snowden was leaked online during the weekend, the German news agency Der Spiegel has published online a dump of PDF files […]
Recent revelations have made it clear that SS7 breaches can occur, thanks to the vulnerabilities of such a set of protocols for telecom. Hackers can take advantage of these threats, like they have done in the past, as German researchers warn. The example of Ukraine and Russia highlights the danger crawling towards countries wishing to […]
The National Security Agency (NSA) has released a collection of compliance reports that details failures and errors in compliance to US laws on surveillance. It’s Christmas time and the National Security Agency decided to post dozens of quarterly reports detailing cases where it potentially violated U.S. laws for monitoring of U.S. citizens and foreigners in […]
The Tor network could be seriously impacted by the seizure of directory authorities operated by law enforcement, despite it is a precious resource for all. The overall architecture of Tor network relies on nine directory authorities locate in the Europe and United States. The servers working as directory authorities provide a signed list of all the […]
A newspaper discovers that bad actors are spying on cell phone communications of Norwegian politicians using the StingRay mobile surveillance equipment. The journalists of a daily newspaper in Norway have discovered a mobile phone surveillance equipment hidden around the Government and Parliamentary building and apparently there is no information on who has used it. Everyday we read about cyber […]
Cryptoy is the free educational app about cryptography designed by GCHQ for use by secondary school students and their teachers. The British Intelligence agency GCHQ has launched “Cryptoy”, an Android mobile app that was designed to encourage youngsters to tackle emerging cyber security threats, the Agency made it available to download today. The Cryptoy mobile app was developed by […]
Yesterday Pierluigi Paganini presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. Yesterday I presented at the ISACA Roma & OWASP Italy conference the state of the art for the Internet of Things paradigm. The presentation highlights the security and privacy issues for the […]
Security experts at BitDefender demonstrated how is possible to access data exchanged between a smartwatch and a smartphone via Bluetooth. The paradigm of Internet of Things is influencing modern society and the way it approaches the technology in everyday life. An impressive amount of Intelligent devices surround us, but often we ignore the repercussion in term of security and privacy. […]
Security experts at Kaspersky Lab have detected the first strain of Turla malware that was designed to infect Linux system and so called Penquin Turla. Security Experts at Kaspersky have discovered a new variant of Turla malware which was designed to hit Linux systems and for this reason, it was called the Penquin Turla. The investigation […]
The Intercept revealed the Op AURORAGOLD run by the NSA to spy on hundreds of companies and organizations to hack cellphone networks worldwide. The Intercept has uncovered details of the operation AURORAGOLD, another massive surveillance program operated by the US Intelligence . The new program is ambitious, the NSA has developed AURORAGOLD with the intent to spy on every cellphone network in […]