NSA

Pierluigi Paganini August 17, 2016
Snowden: NSA Equation Group hack may be the Kremlin’s warning

According to the popular whistleblower Edward Snowden, the hack of the NSA Equation Group may be a Russian response to the US. The public auction of stolen NSA exploits and hacking tools may be the response of the Russian Government to the US Government, which is blaming it for the DNC hack. This is also […]

Pierluigi Paganini August 16, 2016
The alleged NSA’s unit The Equation Group has been hacked. Exploits and tools leaked online.

A group of hackers claims to have hacked the NSA Equation Group, it is selling hacking tools and exploits in online auction. Security experts discussed several times about potential effects of the militarization of the cyberspace. Government-built malware and cyber weapons may run out of control, cyber weapons and hacking tools developed by nation-state hackers […]

Pierluigi Paganini July 13, 2016
Tor and Linux Users Are Extremists? The NSA Thinks So

The National Security Agency (NSA) has reportedly turned its focus on Tor and Linux users, having recently shown a keen interest in these users’ online activities. The NSA has gone as far as calling users of products such as The Amnesic Incognito Live System (Tails) and Tor as extremists. Readers of Linux Journal were also […]

Pierluigi Paganini June 29, 2016
Germany limits BND powers after the disclosure of its support to the NSA

The government of Berlin approved new measures to rein in the activities of BND agency after its scandalous support to NSA surveillance activity. In April 2016, the German government replaced the head of the external intelligence service after a barrage of criticism over the support offered by the Bundesnachrichtendienst (BND) to the NSA in spying […]

Pierluigi Paganini June 13, 2016
The NSA wants to exploit IoT devices for surveillance and sabotage

The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance and sabotage. Intelligence agencies worldwide are looking with increasing interest to theĀ Internet of ThingsĀ paradigm, intelligent objects surround us and manage an impressive volume of data related to of existence. Thanks to theĀ Internet of ThingsĀ devices, we […]

Pierluigi Paganini June 03, 2016
British MPs emails are routinely accessed by GCHQ

New documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails. According to Computer Weekly, new documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept theĀ British MPs emails and peers. The revelations have been made public through an […]

Pierluigi Paganini June 01, 2016
Did Edward Snowden perform a ‘public service’?

There is very little doubt in the mind of many that Snowden has caused irreparable damage to the U.S. espionage program. Was Snowden right in his actions? Recently, former U.S. Attorney General Eric Holder praised Edward Snowden for performing a ā€œpublic serviceā€ by bringing forward the debate over the government’s role in domestic surveillance.Ā  The […]

Pierluigi Paganini May 20, 2016
Telephone metadata by NSA can reveal deeply personal information

A study conducted by the NSA confirms that telephone metadata from phone logs reveals individuals’ Personal Information to government surveillance agencies. It has been argued in the past that the mass collection of phone records by government surveillance agencies poses a significant threat to privacy rights. Now, however, a new study confirms what privacy advocates […]

Pierluigi Paganini May 09, 2016
2015 intelligence transparency report, the surveillance is still nosey

According to 2015 intelligence transparency report, the searches of US citizens made by the NSA and CIA intelligence agencies have almost doubled since 2013 If you believe that the Snowden‘s revelations have stopped or limited the surveillance activities you are obviously wrong. The diffusion of the technology and the increasing threats of espionage and terrorismĀ is […]

Pierluigi Paganini May 08, 2016
How terrorists abuse online services for propaganda?

Researchers at TrendMicro have analyzed online activities of terrorists identifying the techniques and tools used for their propaganda. Using vulnerabilities in software, websites, and web applications as attack vectors, hosting malicious components in cloud services. Other than this if there’s any service getting launched in the future, there will be always chances of abuse. Experts […]