The representatives of the Utah State confirmed that their systems experiences 300,000 hacking attacks a day due to the presence of the NSA Data Center. The Utah state computer systems experience 300,000 hacking attacks a day due to the presence of the NSA data center in the state. The Utah Data Center, also known as the […]
Anarchist operation – US and UK intelligence secretly tapped into live video feeds from Israeli UAVs and fighter jets, monitoring military operations. According to a new lot of documents leaked by the popular whistleblower Edward Snowden, the US and British intelligence agencies have hacked for years into Israeli Air Surveillance under an operation codenamed Anarchist. Snowden, who served as an […]
Tails 2.0 is available for download, it implements new features, including security improvements. Speaking about privacy and operating system, we are obliged to mention the popular Debian-based distribution Tails âThe Amnesiac Incognito Live System.â Now the version 2.0 is available online! Tails is a popular live operating system specifically designed to protect user privacy and […]
According to the German media the German intelligence agency BND has resumed the monitoring activities conducted in a joint effort with the US NSA. It seems that the German government has never suspended the surveillance activities on its unaware population, to be precise monitoring activities conducted in a joint effort with the US NSA have been […]
The British GCHQ has been accused of illegal Computer Network Exploitation activities by Privacy International and internet service providers. The British intelligence is responsible of âpersistentâ illegal hacking of electronic devices and networks worldwide, the Investigatory Powers Tribunal (IPT) has been told. The popular whistleblower Edward Snowden disclosed a collection of documents revealing the extent of surveillance […]
A flaw affecting the way encryption software implements the Diffie-Hellman key exchange algorithm allowed the NSA to break trillions of encrypted connections. Edward Snowden has revealed to the world that the NSA was able to crack also the almost encryption to conduct a large-scale online surveillance. According to Snowden, the intelligence Agency was able to decrypt […]
Rumors on the Internet are linking the attack based in XcodeGhost to operations conducted by the CIA (Central Intelligence Agency). A few days ago principal security firm reported the first major cyber attack on the official Apple App Store, thousands of legitimate applications were infected by the XCodeGhost Malware. Apple announced it is cleaning up the […]
An agreement between the German intelligence agency BfV and the NSA allows the access to the XKeyscore platform to return of  data on German citizens. The German weekly Die Zeit disclosed documents that reveal how the German Intelligence did a deal with the NSA to get the access to the surveillance platform XKeyscore. Internal documents show that Germany’s domestic intelligence agency, […]
A senior U.S. intelligence official revealed that Chinese hackers have accessed the private emails of “many” top Obama administration officials. According to an official of the US intelligence, Chinese hackers have accessed the private emails of “many” top members of the Obama administration. The news was reported by the NBC News which obtained a top […]
According to new revelations of the popular whistleblower Edward Snowden the powerful spying machine XKEYSCORE runs on Red Hat Enterprise Linux. In August 2013, Edward Snowden revealed the existence if a tool named DNI Presenter that allows the Agency to read the content of stored emails, and it also enables the intelligence analysts to tool collects […]