NSA

China bans Symantec & Kaspersky from the list of antivirus suppliers

China has excluded Symantec Corp and Kaspersky Lab from a list of approved antivirus software suppliers to limit the use…

12 years ago

Hackers can exploit USB devices to trigger undetectable attacks

A popular security researcher revealed that bad actors can tap into USB Devices to conduct attacks non detectable with known…

12 years ago

Tor Project is working to fix the alleged critical bug discovered by researchers at Carnegie Mellon

The co-creator of the Tor network confirmed that the Tor Project team is working to identify and fix the bug…

12 years ago

Hidden services in iOS devices could allow users’ surveillance

Apple has worked hard to make iOS devices reasonably secure but hidden services could be exploited to steal every user's…

12 years ago

GCHQ JTRIG Tools and Techniques for propaganda and internet deception

Edward Snowden leaked a top-secret GCHQ document which details the operations and the techniques used by JTRIG unit for propaganda…

12 years ago

Hackers can break Tor Network Anonimity with USD 3000

Security experts Alexander Volynkin and Michael McCord will present at the next Black Hat 2014 a method to break Tor…

12 years ago

NSA XKeyscore targeted Tor Directory Authority servers

The German broadcaster ARD published a report that reveals that NSA XKeyscore has targeted two Germany-based Tor Directory Authority servers.…

12 years ago

How many queries US Intelligence agencies made to Section 702 content data in 2013?

A letter revealed that all the US Intelligence agencies have queried the Section 702 communications content for US persons in…

12 years ago

RAMPART-A allows NSA to tap into fiber optic cables worldwide

The last collection of documents leaked by Snowden reveals the existence of the  RAMPART-A program which allows NSA to tap…

12 years ago

Air-gap network hacking technique, infects systems via cellphone even if isolated from the Internet

Israeli researchers presented the air-gap network hacking technique to compromise a system, even if it is isolated from the Internet,…

12 years ago

This website uses cookies.