Megaupload files have been deleted by Dutch hosting provider LeaseWeb, in the post a resume of the facts and fantastic hypothesis (maybe) on a strange case. Megaupload files have been deleted by LeaseWeb, a Dutch hosting provider, without notice, the news is shocking if we consider the wealth of information contained in the files. LeaseWeb is based […]
Palantir Technologies is considered the principal company behind the design of software used for PRISM program, think of it as the work of a single company is truly an understatement. Palantir Technologies, this is the most popular company name referred when discussing those who have supported the U.S. Government in the development of massive surveillance […]
The top-secret PRISM project claims direct access to servers of major IT corporates including Google, Apple and Facebook. The recent news on the control of communications made by the US Government through the PRISM program has literally left bewildered public opinion, everyone imagined it but when the Population has been confronted with the evidence remained shocked. […]
The U.S. NSA is collecting phone records of millions of Verizon Communications customers, according to a secret court order obtained by the Guardian. The U.S. NSA is collecting phone records of millions of customers Verizon, the second telephone company in the country. The shocking news has been revealed by ‘Guardian‘ whose journalists had access to a “Top […]
Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to defend their assets from the continuous cyber attacks. The press is getting used to news of cyber attacks against companies and government agencies, to date, the trend of the representatives of the cybersecurity of these entities […]
Social networks are platforms that have monopolized majority of user’s internet experience, the imperative is to “social”, and everybody share an incredible amount of personal information exposing its digital identity to serious risks. An element of attraction for cyber criminals is the huge number of services, from gaming to payments, that are developing on these […]
In the last decade the cybercrime had made a substantial leap forward of the main threats to the security of each government. The turnover has reached unimaginable numbers attracting ordinary crime and creating new partnerships between organized crime and cybercrime making impossible to indistinguishable them. Group of criminals are paying cybercriminals to receive […]
Another blow was dealt to the authorities by a group of hackers linked to Anonymous that claims to have breached FBI security posting 1 million Apple Unique Device Identifiers (UDIDs). The UDIDs are the string of numbers that uniquely identifies each Apple device, and AntiSec hacker group has announced to have leaked more than 12 […]
The story begins in November 2011 when in Estonia was arrested a group of persons accused of having developed the dreaded trojan that seems to be able to spread with surprising ease building a scary botnet. The botnet operated by Rove Digital altered user DNS settings, pointing victims to malicious DNS in data centers in […]
On June 28th, a FBI official declared before a House panel that the phenomenon of cyber espionage is increasing with an alarming trend. We are living a period of great crisis and the intellectual property is becoming a privileged target for cyber attacks. It has been estimated that the economic espionage in the current fiscal […]