According to the experts from FireEye attacks from China against the US started declining in mid-2014 and has continued to decrease, why? Earlier this week, FireEye released a report showing a significant decline in cyber-attacks originating from China. According to the report, the attacks started declining in mid-2014 and has continued. According to FireEye, the […]
A coalition of tech groups asked the Congress to roll back changes to Rule 41 that allowed law enforcement to do mass hacking. Congress should block the changes to the rules for the regulation of US law enforcement investigations. The rules allow law enforcement agencies hacking in computers worldwide for its investigation. In April, the […]
Earlier June the Tor Project announced a hardened version of the popular Tor Browser that implements a feature dubbed Selfrando to defeat exploits. Early June the Tor Project announced a hardened version of the popular Tor Browser, the Tor Browser 6.5a1-hardened. “A new hardened Tor Browser release is available. It can be found in the 6.5a1-hardened […]
A hacker using the pseudonymous Guccifer 2.0, claimed responsibility for the cyber-attack on the Democratic National Committee (DNC). Yesterday, we blogged about the cyber-attack on the Democratic National Committee (DNC) that led a dossier of the presumptive Republican presidential nominee, Donald Trump. According to the US-based cyber security company CrowdStrike, two sophisticated Russian espionage groups, COZY […]
The Democratic National Committee’s network was hacked by Russian hackers belonging to nation-state groups that have had access to the group’s communications and databases. Yesterday, the security research firm CrowdStrike reported on a cyber breach of the Democratic National Committee (DNS). CrowdStrike’s incident response time discovered not one, but two hacking groups that it considers “some […]
The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance and sabotage. Intelligence agencies worldwide are looking with increasing interest to the Internet of Things paradigm, intelligent objects surround us and manage an impressive volume of data related to of existence. Thanks to the Internet of Things devices, we […]
A new collection of documents leaked by Edward Snowden and analyzed by The Intercept reveals that MI5 collected significantly more data than it can use. A lot of documents leaked by Edward Snowden revealed that the British Security service MI5 confirmed it was collecting “significantly more than it is able to exploit fully.” The facts date back to 2010, […]
New documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails. According to Computer Weekly, new documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails and peers. The revelations have been made public through an […]
Israeli company Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities on any cell phone on the planet. Israeli-based company Ability is planning a big marketing push aimed at law enforcement in the United States. Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities of revealing the location, calls, and texts of any cell phone […]
The Analysis of SWIFT attacks revealed five additional pieces of malware containing portions of code shared by Lazarus Group. While security experts continue to investigate the cyber heists that involved SWIFT systems, new evidence collected by a senior security researcher from Anomali Labs link the malware to the North Korean hacker crew known as Lazarus Group. The expert discovered that five […]