Earlier June the Tor Project announced a hardened version of the popular Tor Browser that implements a feature dubbed Selfrando to defeat exploits. Early June the Tor Project announced a hardened version of the popular Tor Browser, the Tor Browser 6.5a1-hardened. “A new hardened Tor Browser release is available. It can be found in theĀ 6.5a1-hardened […]
A hacker using the pseudonymous Guccifer 2.0, claimed responsibility for the cyber-attack on the Democratic National Committee (DNC). Yesterday, we blogged about the cyber-attack on the Democratic National Committee (DNC) that led a dossier of the presumptive Republican presidential nominee, Donald Trump. According to theĀ US-based cyber security company CrowdStrike, two sophisticated Russian espionage groups, COZY […]
The Democratic National Committee’s network was hacked by Russian hackers belonging to nation-state groups that have had access to the group’s communications and databases. Yesterday, the security research firm CrowdStrikeĀ reported on a cyber breach of the Democratic National Committee (DNS).Ā CrowdStrikeās incident response time discovered not one, but two hacking groups that it considers āsome […]
The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance and sabotage. Intelligence agencies worldwide are looking with increasing interest to theĀ Internet of ThingsĀ paradigm, intelligent objects surround us and manage an impressive volume of data related to of existence. Thanks to theĀ Internet of ThingsĀ devices, we […]
A new collection of documents leaked by Edward Snowden and analyzed by The Intercept reveals that MI5 collected significantly more data than it can use. A lot of documents leaked by Edward SnowdenĀ revealed that the British Security service MI5 confirmedĀ it was collecting “significantly more than it is able to exploit fully.”Ā The facts dateĀ back to 2010, […]
New documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails. According to Computer Weekly, new documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept theĀ British MPs emails and peers. The revelations have been made public through an […]
Israeli company Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities on any cell phone on the planet. Israeli-based company Ability is planning a big marketing push aimed at law enforcement in the United States.Ā Ability Unlimited Interception System (ULIN) promises unlimited surveillance capabilities of revealing the location, calls, and texts of any cell phone […]
The Analysis of SWIFT attacks revealed five additional pieces of malware containing portions of code shared by Lazarus Group. While security experts continueĀ to investigate the cyber heists that involved SWIFT systems, new evidence collected by aĀ senior security researcherĀ fromĀ Anomali LabsĀ link the malware to theĀ North Korean hacker crew known as Lazarus Group. The expert discovered that five […]
There is very little doubt in the mind of many that Snowden has caused irreparable damage to the U.S. espionage program. Was Snowden right in his actions? Recently, former U.S. Attorney General Eric Holder praised Edward Snowden for performing a āpublic serviceā by bringing forward the debate over the governmentās role in domestic surveillance.Ā The […]
From today, Global Intelligence Insight, working with SecurityAffairs and SecurityMediaPublishing will deliver a weekly report on issues in Syria and Iraq as well as extremist related global terrorism. Data comes not just from open sources but also from material not readily available and is gathered by intelligence professionals using specialist tactics techniques and procedures in […]