Intelligence

A report shows that the NSA is in a search for hackers

The President of the United States of America, Barack Obama approved the law to give to NSA wider powers, what…

11 years ago

Are Russian hackers behind the Bundestag cyber attack?

Security experts involved in investigation on the attack against the Bundestag suspect that the hack was part of a large-scale…

11 years ago

The FBI is not able to monitor ISIS’s encrypted communications

The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS, it urges…

11 years ago

Torus, a milestone in massive surveillance

"Torus" a name that may seem insignificant to many, but that instead revealed a huge expansion in surveillance of FiveEyes…

11 years ago

Bundestag, the Government confirmed a data breach and data leaks

The German Government confirmed that hackers that attacked the Bundestag two weeks ago have had access to data of the…

11 years ago

Yemen Cyber Army will release 1M of records per week to stop Saudi Attacks

Hackers of the Yemen Cyber Army (YCA) had dumped another 1,000,000 records obtained by violating systems at the Saudi Ministry…

11 years ago

US failed a Stuxnet-style attack against North Korea

New revelations came after a high-profile defector warns of that North Korea’s cyber army has the capability to run cyber attacks that could…

11 years ago

MI5 to Google and Whatsapp, hand me your messages

The Conservatives are planning new laws to give MI5 the power to force IT giants to hand over encrypted messages…

11 years ago

Mandrake, NSA identifies users based on how they type on their devices

According to a senior fellow for Lockheed IT, the National Security Agency has tested the use of smartphone-swipe recognition technology…

11 years ago

Astoria, the Tor client designed to beat the NSA surveillance

A team of security researchers announced to have developed Astoria, a new Tor client designed to beat the NSA and…

11 years ago

This website uses cookies.