Edward Snowden is the person responsible for one of the most significant leaks in US political history, he is former technical assistant for the CIA and currently is working at defence contractor Booz Allen Hamilton. Edward Snowden, this name is destined to enter into the history, a single man has compromised the secrecy of the […]
The top-secret PRISM project claims direct access to servers of major IT corporates including Google, Apple and Facebook. The recent news on the control of communications made ââby the US Government through the PRISM program has literally left bewildered public opinion, everyone imagined it but when the Population has been confronted with the evidence remained shocked. […]
The U.S. NSA is collecting phone records of millions of Verizon Communications customers, according to a secret court order obtained by the Guardian. The U.S. NSA is collecting phone records of millions of customers Verizon, the second telephone company in the country. The shocking news has been revealed by ‘Guardian‘ whose journalists had access to a “Top […]
NetTraveler cyber espionage campaign, revealed by Kaspersky’s team, targeted over 350 high profile victims from 40 countries. NetTraveler, this is the name of a new global cyber espionage campaign revealed  by researchers at Kaspersky, the team of experts discovered an espionage activity against over 350 high profile victims from 40 countries. The name of the operation derives […]
The author Tim Shorrock revealed that the US spy system ThinThread was tested on the unsuspecting population of New Zealand from 2000 to 2001 ThinThread is the name of a project that the National Security Agency conducted during the 1990s, the program was focused on sophisticated techniques for wiretapping and intelligence analysis. The program was discontinued after […]
US Air Force published a notice that includes a paragraph on the use of  social media platforms for computer network exploitation. In the recent months I had the opportunity to conduct an interesting study on the use of Social Media in the Military Sector, large diffusion of media platforms makes them very attractive for governments […]
Apple can “bypass the security software” if it chooses, accoring ATF no law enforcement agency could unlock a defendant’s iPhone except Apple that has created a police waiting list because of high demand. Apple is considered an impregnable fortress, the main functions provided by the iOS operating system and related data are inaccessible to ill-intentioned but […]
Google is a mine of information that could be used for various purposes, for this reason National Security Agency realized a book to help its spies uncover intelligence hiding on the web. Few days ago I published an interested article inspired by security expert Dancho Danchev and focused on the use of Google Dorks based tool […]
China and US governments continue to exchange accusations about the continuing incursions into the respective national networks. China and US governments continue to exchange accusations about the continuing incursions into the respective national networks, the cyber attacks are mainly motivated by sabotage and cyber espionage purposes and are increasing exponentially. US government and intelligence agencies […]
Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working  on nuclear weapons research. Security experts have discovered a new IE8 zero-day vulnerability exploited to target U.S. Government experts working  on nuclear weapons research, the concerning discovery has been confirmed by principal security firms that revealed that the flaw […]