Intelligence

Smartwatch Hacked, how to access data exchanged with SmartphoneSmartwatch Hacked, how to access data exchanged with Smartphone

Smartwatch Hacked, how to access data exchanged with Smartphone

Security experts at BitDefender demonstrated how is possible to access data exchanged between a smartwatch and a smartphone via Bluetooth.…

11 years ago
Detected the first samples of Penquin Turla for Linux systemsDetected the first samples of Penquin Turla for Linux systems

Detected the first samples of Penquin Turla for Linux systems

Security experts at Kaspersky Lab have detected the first strain of Turla malware that was designed to infect Linux system…

11 years ago
Op AURORAGOLD – NSA hacks cellphone networks worldwideOp AURORAGOLD – NSA hacks cellphone networks worldwide

Op AURORAGOLD – NSA hacks cellphone networks worldwide

The Intercept revealed the Op AURORAGOLD run by the NSA to spy on hundreds of companies and organizations to hack…

11 years ago
Operation Cleaver – Iranian hackers target industries worldwideOperation Cleaver – Iranian hackers target industries worldwide

Operation Cleaver – Iranian hackers target industries worldwide

Security firm Cylance revealed that Iranian hackers target airlines, energy, defense companies worldwide as part of the Operation Cleaver campaign.…

11 years ago
Is it possible to attribute the backdoor Regin to the cybercrime?Is it possible to attribute the backdoor Regin to the cybercrime?

Is it possible to attribute the backdoor Regin to the cybercrime?

The popular cyber security expert Raoul Chiesa commented the hypothesis that backdoor Regin is a product of organized cybercrime. Excerpt…

11 years ago
APT3 Operation Double Tap is targeting recently disclosed Windows vulnerabilitiesAPT3 Operation Double Tap is targeting recently disclosed Windows vulnerabilities

APT3 Operation Double Tap is targeting recently disclosed Windows vulnerabilities

FireEye discovered that the Group of hackers dubbed APT3 that managed the Op Clandestine Fox is now running a new…

11 years ago
Regin backdoor used to compromise the GSM NetworksRegin backdoor used to compromise the GSM Networks

Regin backdoor used to compromise the GSM Networks

Security experts at Kaspersky Lab issued a detailed paper on the analysis of the backdoor Regin focusing on the attacker's…

11 years ago
Ecuadorean President Correa claims attacks on his private computers and accountsEcuadorean President Correa claims attacks on his private computers and accounts

Ecuadorean President Correa claims attacks on his private computers and accounts

Ecuadorean President Correa has publicly denounced the US Intelligence continuous cyber attacks against his private internet accounts and computers. Ecuadorean…

11 years ago
British firm now owned by Vodafone aided GCHQ in wiretapping undersea cablesBritish firm now owned by Vodafone aided GCHQ in wiretapping undersea cables

British firm now owned by Vodafone aided GCHQ in wiretapping undersea cables

New documents leaked by Snowden reveal the crucial role of a Vodafone-owned company in wiretapping of undersea cables for massive…

11 years ago
ISIS keeps getting better at avoiding US surveillanceISIS keeps getting better at avoiding US surveillance

ISIS keeps getting better at avoiding US surveillance

Speaking before the House Armed Services Committee the US Defense is worried by the capabilities of the ISIS members for…

11 years ago