Intelligence

US Gov used airplanes to collect American cell phone dataUS Gov used airplanes to collect American cell phone data

US Gov used airplanes to collect American cell phone data

The WSJ revealed that the US authorities coordinated by the Department of Justice has been using airplanes to collect Americans'…

11 years ago
Darkhotel – Cybercrime crew targets execs using hotel InternetDarkhotel – Cybercrime crew targets execs using hotel Internet

Darkhotel – Cybercrime crew targets execs using hotel Internet

Kaspersky revealed that a crew of criminals dubbed Darkhotel targets executives traveling across Asia through hotel internet networks. Security experts…

11 years ago
Australia Spies Warns of state backed cyberattacks on G20 SummitAustralia Spies Warns of state backed cyberattacks on G20 Summit

Australia Spies Warns of state backed cyberattacks on G20 Summit

Aussie spooks have warned of ‘real and persistent’ cyberattacks on participants of the upcoming G20 conference in Brisbane. World leaders…

11 years ago
ISIS issued a manual for a safe use of Twitter and other mediaISIS issued a manual for a safe use of Twitter and other media

ISIS issued a manual for a safe use of Twitter and other media

The ISIS has released a manual for its militants, titled “How to Tweet Safely Without Giving out Your Location to…

11 years ago
Hackers infiltrated a White House unclassified computer networkHackers infiltrated a White House unclassified computer network

Hackers infiltrated a White House unclassified computer network

According to an unnamed official at the White House, hackers infiltrated an unclassified network.The Obama Administration has confirmed the incident.…

11 years ago
APT28: FireEye uncovered a Russian cyber espionage campaignAPT28: FireEye uncovered a Russian cyber espionage campaign

APT28: FireEye uncovered a Russian cyber espionage campaign

APT28: FireEye has issued a new report uncovering a large scale cyber-espionage campaign that appears sponsored by the Russian government.…

11 years ago
Hacking air gapped networks by using lasers and dronesHacking air gapped networks by using lasers and drones

Hacking air gapped networks by using lasers and drones

A group of Israeli researchers has demonstrated at the last Black Hat Conference how to hack air gapped networks by…

11 years ago
100 million iCloud users spied by the Chinese Government100 million iCloud users spied by the Chinese Government

100 million iCloud users spied by the Chinese Government

A report confirms that China is collecting private data of more that 100 million Apple iCloud users resident in the…

11 years ago
China considers cybersecurity a primary needChina considers cybersecurity a primary need

China considers cybersecurity a primary need

China calls for stronger cybersecurity to respond the aggressive cyber-war conducted against its systems by Western countries. It's not a mystery,…

11 years ago
There is a second Snowden in the US intelligence, which is leaking classified dataThere is a second Snowden in the US intelligence, which is leaking classified data

There is a second Snowden in the US intelligence, which is leaking classified data

Citizenfour, the new film on Edward Snowden, shows journalist Greenwald discussing with a second source which is disclosing classified information.…

11 years ago