According to a senior fellow for Lockheed IT, the National Security Agency has tested the use of smartphone-swipe recognition technology dubbed Mandrake. The NSA has developed a new technology, dubbed “Mandrake“, that can identify users from the way they swipe strokes and text on a smartphone screen. The news was reported by officials with Lockheed […]
A team of security researchers announced to have developed Astoria, a new Tor client designed to beat the NSA and reduce the efficiency of timing attacks. Tor and Deep web are becoming terms even popular among Internet users, the use of anonymizing network is constantly increasing for this reason intelligence agencies are focusing their efforts in its monitoring. […]
While members of the ISIS are continuing to explore the Deep Web for various activities, the US Intelligence plans activities to track them. The Dark Web is a privileged environment for cyber criminals and state-sponsored hackers due to the anonymity offered by its services. Unfortunately, another category of threat actors is exploiting the deep web, the terrorists, for […]
The Bundestag has become the target of a significant cyber attack, hackers tried to compromise the internal network of the German Parliament. The German parliament Bundestag has officially confirmed media reports about a hacking attack that hit the Institution last week. “There has been an attack on the IT systems of the Bundestag,” spokesman Ernst […]
US SOCOM admitted that Counter-Terrorism Special Forces scrutinize FaceBook and other social media to handle potentially useful information. Exactly two years ago I wrote about the use of social media in the Military. I explained why social media platforms represent a powerful instrument for activities operated by governments and intelligence agencies. Modern social media networks are actively used by […]
The NSA veteran Chief General Keith Alexander fears crippling cyber-attack on Western energy infrastructure and warned that we are not prepared for that. Security experts are warning companies in the energy industry of possible cyber attacks and Western plants are more exposed to the cyber threats. Electric grids, oil refineries and power plants are the […]
The Dark Web email service SIGAINT suffered a major attack that involved 70 exit nodes, a circumstance that suggests Government operation. Law enforcement and Intelligence agencies are always involved in the infiltration of Darknets and related services with the primary intent to monitor bad actors and de-anonymize users. The Tor-Based Dark Web Email Service SIGAINT is one […]
Security experts at Fox-IT have developed a method for detecting NSA Quantum Insert attacks and have published an interesting post on the hacking practice. Security researchers at Fox-IT have developed a method for detecting NSA hacking activity operated through the Quantum Insert-style hacks. The team of experts has published free open-source tools to detect duplicate […]
Encryption has been used by more people over time and this has led to the NSA and the US Government to suggest new ways of accessing encrypted content. The uprising course of encryption and the fact that its use has become a lot more frequent and continues on increasing in popularity has made the United States wonder how they […]
Researchers at FireEye uncovered a new threat actor dubbed APT30 that run a decade-long cyber espionage campaign backed by the Chinese Government. Security experts at FireEye have uncovered a new long-running cyber espionage campaign, the researchers speculate that the campaign is active since at least 2005. The threat actor behind the campaign was dubbed APT30 by the researchers, […]