Intelligence

Pierluigi Paganini September 21, 2014
DoJ proposal wants legitimate FBI hacking ops against anonymity

DoJ proposal is trying to legitimate FBI hacking operations against Internet users that make use of any kind of anonymizing technology. The FBI wants greater authority to hack overseas computers, according to a law professor. The Department of Justice (DoJ) is declaring war to online anonymity, its proposal to amend Rule 41 of the Federal […]

Pierluigi Paganini September 19, 2014
Schneider ClearSCADA platform affected by different security flaws

ICS-CERT issued a security advisory for the existence of vulnerabilities in a variety of Schneider Electric StruxureWare SCADA Expert ClearSCADA versions. According to a recent advisory issued by the ICS-CERT (ICSA-14-259-01) several Electric’s StruxureWare SCADA Expert ClearSCADA are affected by different vulnerabilities. The independent researcher Aditya Sood has discovered a weak hashing algorithm and CSRF vulnerability in […]

Pierluigi Paganini September 18, 2014
Chinese hackers hit several US contractors

A report issued by the Senate Armed Services Committee reveals alleged Chinese hackers conducted dozens of cyber attacks on US defense contractors. A study conducted by the Senate Armed Services Committee discovered that hackers gained access to the systems run by US defense contractors work for the US Transportation Command (TRANSCOM). The Senate study released […]

Pierluigi Paganini September 18, 2014
Surveillance – How to secretly track cellphone users position around the globe

Using the proper surveillance systems available on the market it is easy and quick to track cellphone and the movements of targets everywhere on the globe. We recently discussed the decision of Wikileaks to publish copies of the criticized surveillance software FinFisher, highlighting the dangers for the militarization of the cyberspace and in particular for […]

Pierluigi Paganini September 17, 2014
WikiLeaks publicly disclosed copies of FinFisher surveillance software

WikiLeaks has published copies of the criticized FinFisher surveillance software, claiming that the malware is sold to the most “abusive” regimes in the world. Copies of the surveillance software “FinFisher” were made available for public scrutiny by WikiLeaks early this week. The international, online journalistic organization has decided to publish the public disclose the criticized software online to allow […]

Pierluigi Paganini September 15, 2014
Treasure Map – Fiveeyes tap into German telco networks to map end devices

Documents leaked by Snowden reveal the existence of the Treasure Map program run by FiveEyes Intelligence agencies to control the global network. Treasure Map is the name of the last program of intelligence revealed by documents leaked by the whistleblower Edward Snowden. Treasure Map is a program to map every device exposed on the Internet, […]

Pierluigi Paganini September 14, 2014
ISIS is ramping up efforts to mount a massive cyber attack

Extremists groups of ISIS and Al Qaeda are ramping up efforts to launch major cyber attacks on Western Critical Infrastructure to set up digital Caliphate. In time I’m writing the ISIS has released a new video purporting to show the beheading of British hostage David Haines, the group has started again to flood the social media […]

Pierluigi Paganini September 08, 2014
The Chinese Government runs MitM attack on Google users

The Chinese Government is running a MITM attack on SSL encrypted traffic between Chinese China Education and Research Network and Google. Google website, like many other web services, is blocked by the Chinese Government, which operate a rugged censorship on the Internet content. But block a resource like Google is anachronistic and counterproductive, for this reason, China allows […]

Pierluigi Paganini September 02, 2014
Bogus cellphone towers found in the US

CryptoPhone 500 security firm has found 17 bogus cellphone towers in the US with a heavily customized handset exploited for surveillance activities. Seventeen mysterious cellphone towers have been discovered in the USA, they are identical to legitimate towers, the unique difference is related a heavily customized handset built for Android security. According to the Popular Science, […]

Pierluigi Paganini August 30, 2014
Oil and energy industry in Norway is under attack

According to a government agencies around 300 oil and energy companies in Norway have been targeted by one of the biggest hacking campaign. Nearly 300 oil and energy companies in Norway have been targeted by one of the biggest cyber attacks ever to happen in the country, a government source reported last week. The identities of the firms […]