NSA

Snowden: NSA Equation Group hack may be the Kremlin’s warning

According to the popular whistleblower Edward Snowden, the hack of the NSA Equation Group may be a Russian response to…

10 years ago

The alleged NSA’s unit The Equation Group has been hacked. Exploits and tools leaked online.

A group of hackers claims to have hacked the NSA Equation Group, it is selling hacking tools and exploits in…

10 years ago

Tor and Linux Users Are Extremists? The NSA Thinks So

The National Security Agency (NSA) has reportedly turned its focus on Tor and Linux users, having recently shown a keen…

10 years ago

Germany limits BND powers after the disclosure of its support to the NSA

The government of Berlin approved new measures to rein in the activities of BND agency after its scandalous support to…

10 years ago

The NSA wants to exploit IoT devices for surveillance and sabotage

The NSA and other intelligence agencies are spending a significant effort in research for hacking IoT devices for both surveillance…

10 years ago

British MPs emails are routinely accessed by GCHQ

New documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs…

10 years ago

Did Edward Snowden perform a ‘public service’?

There is very little doubt in the mind of many that Snowden has caused irreparable damage to the U.S. espionage…

10 years ago

Telephone metadata by NSA can reveal deeply personal information

A study conducted by the NSA confirms that telephone metadata from phone logs reveals individuals’ Personal Information to government surveillance…

10 years ago

2015 intelligence transparency report, the surveillance is still nosey

According to 2015 intelligence transparency report, the searches of US citizens made by the NSA and CIA intelligence agencies have…

10 years ago

How terrorists abuse online services for propaganda?

Researchers at TrendMicro have analyzed online activities of terrorists identifying the techniques and tools used for their propaganda. Using vulnerabilities…

10 years ago

This website uses cookies.