Intelligence

Pierluigi Paganini June 23, 2016
What’s really behind China’s drop in attacks against the US?

According to the experts from FireEye attacks from China against the US started declining in mid-2014 and has continued to decrease, why? Earlier this week, FireEye released a report showing a significant decline in cyber-attacks originating from China.  According to the report, the attacks started declining in mid-2014 and has continued.  According to FireEye, the […]

Pierluigi Paganini June 22, 2016
Tech coalition asked to roll back changes to Rule 41 that allows FBI mass hacking

A coalition of tech groups asked the Congress to roll back changes to Rule 41 that allowed law enforcement to do mass hacking. Congress should block the changes to the rules for the regulation of US law enforcement investigations. The rules allow law enforcement agencies hacking in computers worldwide for its investigation. In April, the […]

Pierluigi Paganini June 20, 2016
Hardened Tor Browser implements the Selfrando feature to defeat exploits

Earlier June the Tor Project announced a hardened version of the popular Tor Browser that implements a feature dubbed Selfrando to defeat exploits. Early June the Tor Project announced a hardened version of the popular Tor Browser, the Tor Browser 6.5a1-hardened. “A new hardened Tor Browser release is available. It can be found in the 6.5a1-hardened […]

Pierluigi Paganini June 17, 2016
Guccifer 2.0 – Lone Wolf or a Fancy Bear?

A hacker using the pseudonymous Guccifer 2.0, claimed responsibility for the cyber-attack on the Democratic National Committee (DNC). Yesterday, we blogged about the cyber-attack on the Democratic National Committee (DNC) that led a dossier of the presumptive Republican presidential nominee, Donald Trump. According to the US-based cyber security company CrowdStrike, two sophisticated Russian espionage groups, COZY […]

Pierluigi Paganini June 16, 2016
Russian Hackers get Cozy with American Politics

The Democratic National Committee’s network was hacked by Russian hackers belonging to nation-state groups that have had access to the group’s communications and databases. Yesterday, the security research firm CrowdStrike reported on a cyber breach of the Democratic National Committee (DNS).  CrowdStrike’s incident response time discovered not one, but two hacking groups that it considers “some […]

Pierluigi Paganini June 13, 2016
The NSA wants to exploit IoT devices for surveillance and sabotage

The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance and sabotage. Intelligence agencies worldwide are looking with increasing interest to the Internet of Things paradigm, intelligent objects surround us and manage an impressive volume of data related to of existence. Thanks to the Internet of Things devices, we […]

Pierluigi Paganini June 08, 2016
MI5 collected significantly more data than it can use

A new collection of documents leaked by Edward Snowden and analyzed by The Intercept reveals that MI5 collected significantly more data than it can use. A lot of documents leaked by Edward Snowden revealed that the British Security service MI5 confirmed it was collecting “significantly more than it is able to exploit fully.” The facts date back to 2010, […]

Pierluigi Paganini June 03, 2016
British MPs emails are routinely accessed by GCHQ

New documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails. According to Computer Weekly, new documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails and peers. The revelations have been made public through an […]

Pierluigi Paganini June 03, 2016
Unlimited surveillance capabilities, but it’s going to cost you

Israeli company Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities on any cell phone on the planet. Israeli-based company Ability is planning a big marketing push aimed at law enforcement in the United States.  Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities of revealing the location, calls, and texts of any cell phone […]

Pierluigi Paganini June 02, 2016
New evidence links the NK Lazarus Group to SWIFT banking attacks

The Analysis of SWIFT attacks revealed five additional pieces of malware containing portions of code shared by Lazarus Group. While security experts continue to investigate the cyber heists that involved SWIFT systems, new evidence collected by a senior security researcher from Anomali Labs link the malware to the North Korean hacker crew known as Lazarus Group. The expert discovered that five […]