Last revelation based on the documents leaked by Edward Snowden is related to the allegedly encryption backdoor inserted by RSA in the BSafe software. Is it possible to insert an encryption backdoor in one of most popular cryptographic products? Probably it is just a question of money if the request came from the NSA, according […]
During a CBS Interview show “60 Minutes”, The NSA Director General Alexander and the Information Assurance Director Plunkett claimed a foreign government has developed a BIOS based malware that can remotely destroy any computer. Senior National Security Agency (NSA) officials have revealed to CBS American television newsmagazine â60 Minutesâ that a foreign government has tried […]
Researchers at Kaspersky Lab discovered Apple Safari browser stores previous secure session data unencrypted in a hidden folder. Appleâs Safari browser stores session information including authentication credentials used in previous HTTPS sessions to implement the feature “Reopen All Windows from Last Session”. Safari stores in a plain text XML file called Property list, or plist, […]
Intelligence experts at IntelCrawler discovered a Russian-speaking group offers bulletproof hosting in Syria, Lebanon … Countries that represent the new heaven for cybercriminals IntelCrawler: «Near East â new heaven for bulletproof hosting providers, first effects of war on cyberspace in action» Los-Angeles CA– The US based cyber and risk intelligence provider IntelCrawler has announced […]
Security experts at FireEye discovered a cyber espionage operation conducted by Chinese hackers on the computer at the foreign ministries of the Czech Republic, Portugal, Bulgaria, Latvia and Hungary. Security experts at FireEye have revealed that they were able to track Chinese hackers spying on EU foreign ministries for about a week. The hackers have targeted the computers belonging at […]
The Guardian published documents that reveal NSA and GCHQ infiltrate gaming platforms and communities including World of Warcraft and Second Life NSA and British GCHQ are working to infiltrate the virtual world of online games considered as an attractive environment for cyber terrorists and hackers, this is the last chapter of the Snowden‘s Saga. The Guardian […]
Google discovered the unauthorized use of digital certificates issued by an intermediate certificate authority linked to ANSSI for several Google domains. Google has revealed that late on December 3rd it became aware of unauthorized digital certificates for several Google domains and immediately has started the investigation. Security experts at Google found that the digital certificates […]
Cyber warfare or information warfare is still a gray area of the military doctrine, it is necessary to define the “model of conflict” and rules for the actors. Cyber war and cyber information warfare are two terms very inflated used to describe the current disputes within the cyberspace. To explain the effect of acts of […]
Iranian report states that Israel and Saudi Arabia are plotting new computer cyber weapon to sabotage the Iranian nuclear program like happened with Stuxnet. Saudi spy agency, Mossad are collaborating in the design of malware worse than Stuxnet. The Fars agency reported that Israel and Saudi Arabia have started a joint collaboration for the development […]
The U.S. Government was sentenced for $50 Million because it has used of pirated copies of Military Software designed by Apptricity company. The software piracy is not a prerogative of commercial software, illegal copies of military software have been used for years by U.S. Forces. The software used by U.S. military appears to be pirated […]