Intelligence

Nice Recording eXpress lawful intercept solution is flawedNice Recording eXpress lawful intercept solution is flawed

Nice Recording eXpress lawful intercept solution is flawed

Researchers at SEC Consult Vulnerability Lab discovered that Nice Recording eXpress lawful intercept software contains numerous flaws, including a backdoor.…

11 years ago
CYBERPOL Investigates Indentify theft onlineCYBERPOL Investigates Indentify theft online

CYBERPOL Investigates Indentify theft online

CYBERPOL the International Cyber-Security Organization (ICSO)  is looking into the ID theft of personalities on social websites online that offers…

11 years ago
UPDATED – Ex LulzSec Sabu helped feds foil 300+ cyberattacksUPDATED – Ex LulzSec Sabu helped feds foil 300+ cyberattacks

UPDATED – Ex LulzSec Sabu helped feds foil 300+ cyberattacks

Prosecutors filed a document which reveals ex LulzSec hacker Sabu helped US authorities stop more that 300 cyber attacks against…

11 years ago
Critical Infrastructure, hackers targeted public utility SCADACritical Infrastructure, hackers targeted public utility SCADA

Critical Infrastructure, hackers targeted public utility SCADA

Cyber attacks could pose a potentially huge risk to US critical infrastructure, state-sponsored hackers and cyber criminals are increasing their…

11 years ago
FireEye-Mandiant data confirms DOJ’s Findings on APT1FireEye-Mandiant data confirms DOJ’s Findings on APT1

FireEye-Mandiant data confirms DOJ’s Findings on APT1

Experts at Mandiant have corroborated the DOJ’s data by releasing additional evidence not included in the original APT1 report. One…

11 years ago
Unrecom phishing campaign hit high-profile entities globallyUnrecom phishing campaign hit high-profile entities globally

Unrecom phishing campaign hit high-profile entities globally

Security Experts at Fidelis Cyber Security firm have recently discovered a new phishing campaign using the Unrecom RAT (remote access…

11 years ago
Al-Qaeda is developing new Encryption tools in response to NSA surveillanceAl-Qaeda is developing new Encryption tools in response to NSA surveillance

Al-Qaeda is developing new Encryption tools in response to NSA surveillance

Recorded Future published a report to show that members of Al-Qaeda are developing a series of new encryption software in…

11 years ago
NSA intercepts US-made Routers to implant surveillance backdoorNSA intercepts US-made Routers to implant surveillance backdoor

NSA intercepts US-made Routers to implant surveillance backdoor

Journalist Glenn Greenwald published the last revelation of NSA surveillance, the agency tampers with US-made internet routers destined for foreign…

11 years ago
Ajax Security Team lead Iran-based hacking groupsAjax Security Team lead Iran-based hacking groups

Ajax Security Team lead Iran-based hacking groups

FireEye published a report titled "Operation Saffron Rose" to document the activities of the Iranian hacking group named Ajax Security…

11 years ago
US DoJ proposal legalizes secret hacking for federal agenciesUS DoJ proposal legalizes secret hacking for federal agencies

US DoJ proposal legalizes secret hacking for federal agencies

US DoJ formalized a proposal to allow U.S Federal Agencies to secretly hack suspects' computers to collect criminal evidence into…

11 years ago