The European Police Office (Europol) confirmed that difficulties to face the menaces of cybercrimes to the Internet of Everything (IoE). The EUâs chief criminal intelligence agency made a disconcerting revelation, the threat of âonline murderâ is set to rise. It isn’t a science movie trailer, but the finding that cyber criminals increasingly targeting victims with internet […]
Security experts speculate that the Chinese government is using mobile spyware, MITM attacks and Internet monitoring to control Hong Kong protesters. In the last days I published the news regarding a spyware used to spy on activists in Hong Kong, a Fake Occupy Central app is targeting the smartphones of the activists belonging to the Occupy Central […]
The journalist Erich Möchel leaked photos reported alleged NSA monitoring stations in Vienna which are used by the Intelligence to spy on UN. Photos published by the journalist Erich Möchel in a blog post seems to confirm the presence of an NSA surveillance infrastructure, mentioned in the Snowden’s leaked documents “Vienna Annex”, in the attics of IZD Towers […]
DoJ proposal is trying to legitimate FBI hacking operations against Internet users that make use of any kind of anonymizing technology. The FBI wants greater authority to hack overseas computers, according to a law professor. The Department of Justice (DoJ) is declaring war to online anonymity, its proposal to amend Rule 41 of the Federal […]
ICS-CERT issued a security advisory for the existence of vulnerabilities in a variety of Schneider Electric StruxureWare SCADA Expert ClearSCADA versions. According to a recent advisory issued by the ICS-CERT (ICSA-14-259-01) several Electricâs StruxureWare SCADA Expert ClearSCADA are affected by different vulnerabilities. The independent researcher Aditya Sood has discovered a weak hashing algorithm and CSRF vulnerability in […]
A report issued by the Senate Armed Services Committee reveals alleged Chinese hackers conducted dozens of cyber attacks on US defense contractors. A study conducted by the Senate Armed Services Committee discovered that hackers gained access to the systems run by US defense contractors work for the US Transportation Command (TRANSCOM). The Senate study released […]
Using the proper surveillance systems available on the market it is easy and quick to track cellphone and the movements of targets everywhere on the globe. We recently discussed the decision of Wikileaks to publish copies of the criticized surveillance software FinFisher, highlighting the dangers for the militarization of the cyberspace and in particular for […]
WikiLeaks has published copies of the criticized FinFisher surveillance software, claiming that the malware is sold to the most “abusive” regimes in the world. Copies of the surveillance software âFinFisherâ were made available for public scrutiny by WikiLeaks early this week. The international, online journalistic organization has decided to publish the public disclose the criticized software online to allow […]
Documents leaked by Snowden reveal the existence of the Treasure Map program run by FiveEyes Intelligence agencies to control the global network. Treasure Map is the name of the last program of intelligence revealed by documents leaked by the whistleblower Edward Snowden. Treasure Map is a program to map every device exposed on the Internet, […]
Extremists groups of ISIS and Al Qaeda are ramping up efforts to launch major cyber attacks on Western Critical Infrastructure to set up digital Caliphate. In time I’m writing the ISIS has released a new video purporting to show the beheading of British hostage David Haines, the group has started again to flood the social media […]