Intelligence

A new EU counter-terrorism unit will tackle extremists online

The Eu plans for a new European counter-terrorism unit that  will tackle extremists online in a joint effort of law…

11 years ago

EquationDrug, the hacking platform of the Equation Group APT

Experts at Kaspersky Lab published a detailed analysis of the EquationDrug platform and its modules developed by the Equation Group…

11 years ago

How the CIA is working to break the security of Apple devices

A new interesting report published by The Intercept details the effort spent by the US intelligence to compromise the security…

11 years ago

Snowden reveals New Zealand surveillance Waihopai Base

A new collection of documents leaked by Edward Snowden shines light on shadowy New Zealand surveillance activities operated at the…

11 years ago

Babar and Casper, two Malware likely designed by the French Intelligence

After Babar malware, security researchers detected a new strain of malware dubbed Casper that appears to be linked to the…

11 years ago

Indian Government bans third party email services, including Gmail and Yahoo

The Indian Government bans third party email services, including Gmail and Yahoo, from its offices in order to protect government…

11 years ago

Doubts about how CSE monitors Canadian emails to the Government

New secret documents leaked by Snowden reveal that CSE monitors millions of Canadian emails to Government, but privacy advocates criticized…

11 years ago

SIM Maker Gemalto Confirms cyber attacks, but excludes key theft

SIM maker Gemalto confirmed that unknown hackers targeted its systems in the period indicated by Snowden, but denied any massive…

11 years ago

NSA Director Rogers urges the creation a legal framework for the US authorities

The NSA Director Rogers urges the creation of an independent legal framework to regulate the operations conducted US authorities. The…

11 years ago

CyberCriminals and their APT and AVT Techniques

The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat)…

11 years ago

This website uses cookies.