Intelligence

Pierluigi Paganini January 29, 2014
Snowden revealed the NSA is involved in industrial espionage

Edward Snowden revealed to the German public broadcaster ARD TV that the NSA is involved in industrial espionage against foreign governments and businesses. The former NSA contractor Edward Snowden revealed that the National Security Agency is responsible of  industrial espionage, for year governments are blaming China for cyber espionage and now the popular whistleblower presented an uncomfortable truth to […]

Pierluigi Paganini January 28, 2014
Hackers used Spear Phishing attack to hack CNN Blogs

Security analysts at Intelligence firm InterCrawler published the details of the investigation on recent attack against CNN Blogs and social media accounts. Recently a few social media accounts belonging to CNN and blogs were compromised, including CNN’s main Facebook account, CNN Politics’ Facebook account and the Twitter pages for CNN and CNN’s Security Clearance. At the […]

Pierluigi Paganini January 28, 2014
FBI seized Tormail database, it has the access to all users emails

The Federal Bureau of Investigation (FBI) seized the database of Tormail service for its investigation on cybercrime and illegal online hacking. Do you have used the Tormail Email service to protect your privacy? Are you searching for anonymity online? Well, the revelation regarding Tor Stinks project and many recent news on the spying activity discovered on Tor Traffic made […]

Pierluigi Paganini January 15, 2014
Kaspersky discovered Icefog Hit US energy companies with Java Backdoor

Kaspersky experts discovered a java version of icefog espionage campaign that targeted at least 3 us oil, gas companies spreading a backdoor dubbed Javafog. Kaspersky Lab in September 2013 announced to have discovered Icefog team, an emerging group of cyber-mercenaries available for hire to conduct surgical hit and run operations against strategic targets.  The cyber […]

Pierluigi Paganini January 12, 2014
How the NSA Monitors Target Computers with Radar Wave Devices

If you desire to read the details on each of the above components and discover how NSA used it please read my article at Infosec Institute “How the NSA Monitors Target Computers with Radar Wave Devices” Introduction Germany’s Der Spiegel has published a couple of disturbing articles on the NSA surveillance activities. The media agency has focused its articles on […]

Pierluigi Paganini January 08, 2014
Windows Zero-Day vulnerability used in targeted attacks against 28 Embassies

TrendLab malware analysts confirmed that recent Windows Zero-Day vulnerability was exploited in cyber attack against Embassies in a Middle Eastern capital. At the end of the last year Microsoft revealed that a zero-day vulnerability was in use in targeted attacks against Windows XP and Server 2003 systems. The discovery of the flaw in Microsoft OSs was made […]

Pierluigi Paganini January 07, 2014
Project NETRA – The Indian Internet Surveillance

The Indian Government is launching Netra project for internet surveillance. Obvious concerns for online privacy and freedom of expression of Indian population. The Internet surveillance in India is reality thanks  a project codenamed NETRA (Network Traffic Analysis), it is able to detect and automatically capture any voice traffic passing through software such as VoIP systems […]

Pierluigi Paganini January 06, 2014
French satellites sold to UAE may contain backdoored components

UAE wants terminate a contract with French companies for the supply of two Falcon Eye spy satellites due the presence of security compromising components. United Arab Emirates could cancel a contract with Frence for the supply of  two intelligence satellites due the discovery of what was described as “security compromising components.” The UAE claims it […]

Pierluigi Paganini January 05, 2014
Quantum computer is the future weapon of NSA

The Washington post revealed that NSA is spending a great effort to build a quantum computer that could break most types of encryption. The NSA is monopolizing the security landscape, The Washington Post reported that the U.S. Intelligence Agency spending a significant effort to develop a computer that could break the majority of encryption algorithms […]

Pierluigi Paganini January 02, 2014
DROPOUTJEEP – How NSA completely controls your iPhone

Leaked documents shared by Der Spiegel show how NSA spyware codenamed DROPOUTJEEP can spy on every Apple iPhone. Apple denies any claim. Users buy the iPhone, NSA controls them. This is not a slogan for the last Apple advertising, it is the uncomfortable truth revealed by another set of NSA documents leaked by Snowden and […]