Vodafone has recently issued the Law Enforcement Disclosure Report to reveal the existence of secret wires that allow state surveillance. Vodafone, one of the largest mobile carrier of the world has issued a document, titled “Law Enforcement Disclosure Report“, which describes the collaboration provided by the company to many governments for lawful interception for some of its 400 […]
A last revelation on the surveillance activities of British intelligence GCHQ confirms the existence of spy base tapping undersea cables in the Middle East. In the last year Edward Snowden has leaked many disconcerting documents for the surveillance activity conducted by the NSA and GCHQ intelligence agencies, the last revelation is related Britain covert spying programme, in particular the information on clandestine British base […]
FireEye has issued data which show the intensification of activities in the cyberspace correspondent to geopolitical tension between Russia and Ukraine. The Geopolitical dispute between Russia and Ukraine has its correspondence in the cyberspace, principal security experts have observed an increase in the number of cyber attacks between the two countries. Cyber units on both sides may be actively engaged in […]
Experts at iSight issued a report describing the most elaborate net-based spying campaign organized by Iranian hackers using social media. Iranian Hackers use a network of fake accounts (NEWSCASTER network) on principal social media to spy on US officials and political staff worldwide, this is reported in an analysis done by iSIGHT Partners. A few days ago […]
Encryption Tool TrueCrypt shuts down mysteriously, a message on the official SourceForge-hosted page is encouraging users to adopt Microsoft Bitlocker. TrueCrypt, another myth is falling down? Many TrueCrypt users have had a nasty surprise visiting the TrueCrypt page at SourceForge, the page content warns visitors that the open source encryption software is not secure and that its […]
Researchers at SEC Consult Vulnerability Lab discovered that Nice Recording eXpress lawful intercept software contains numerous flaws, including a backdoor. Nice Recording eXpress voice-recording package software used by law enforcement to intercept communications of suspects under investigation contains various flaws, this is the discovery of security researchers at SEC Consult Vulnerability Lab. The researchers have recently published an […]
CYBERPOL the International Cyber-Security Organization (ICSO) is looking into the ID theft of personalities on social websites online that offers very little, if any protection of your identity being used by third parties. This comes after a fake Ban Ki Moon ID profile was discovered by CYBERPOL on LinkedIn on Sunday past. During the examination, […]
Prosecutors filed a document which reveals ex LulzSec hacker Sabu helped US authorities stop more that 300 cyber attacks against US targets. The time of sentencing the former LulzSec hacker is arrived, next week the turned-FBI informant Hector “Sabu” Monsegur will be judged for the numerous cyber attacks he organized when he was a member of Anonymous group. […]
Cyber attacks could pose a potentially huge risk to US critical infrastructure, state-sponsored hackers and cyber criminals are increasing their activity. Governments are even more alarmed by the possibility of cyber attacks against critical infrastructure, hackers could pose a potentially huge risk to the helpless population. In a recent US Government exercise, a team of hackers […]
Experts at Mandiant have corroborated the DOJ’s data by releasing additional evidence not included in the original APT1 report. One of the news most important shared on the internet this week it the one related to the indictment announced by US Department of Justice (DOJ) on five members of PLA Unit 61398. One year ago Mandiant experts deeply analyzed […]