NSA

Hackers spied on a US Congressman’s communication abusing the SS7 protocol

Security experts eavesdropped and geographic tracked a US Congressman only using his phone number by abusing the SS7 protocol. Hackers…

10 years ago

Feds request Judge to review the order to reveal TOR Exploit Code

FBI is fighting back against the federal judge’s order to reveal the Tor Exploit and with DoJ filed a sealed…

10 years ago

Wikileaks – NSA tapped world leaders for US geopolitical Interests

The NSA tapped world leaders for US Geopolitical Interests, including a conversation between Netanyahu-Berlusconi over the U.S.-Israel Relations. A couple…

10 years ago

The DoD funded the Carnegie Mellon University’s research on Tor Hacking

A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor…

10 years ago

The IPT ruled that GCHQ spies can legally hack any electronic devices

The British Intelligence Agency GCHQ has a license to hack computers and devices, the UK's Investigatory Powers Tribunal (IPT) ruled. This…

10 years ago

New docs confirm CIA planned to kidnap Snowden

Documents obtained by Denfri.dk media confirm rendition flight used Copenhagen Airport for mission to kidnap Edward Snowden. According to documents…

10 years ago

National Security Agency says US Govt new spying program meets security standards

National Security Agency says the US Govt surveillance programme for collecting domestic telephone records rmeets security standards The United States…

10 years ago

Cyber defence is a profitable “Hamster Wheel”

Lights and shadows of the cyber defence market that will reach 170 billion in 2020 becoming vital to the global…

10 years ago

Juniper will drop a function alleged developed by the NSA for surveillance

Juniper Networks announced on Friday it would stop using the security code that experts believe was developed by NSA for…

10 years ago

Hackers in the wild attempt to exploit the Juniper Backdoor

A honeypot set up by researchers at the SANS institute has shown that hackers  have already attempted to exploit the…

10 years ago

This website uses cookies.