Web Intelligence experts at Recorded Future issued the second part of the analysis on the usage of encryption by Al-Qaeda after the Snowden leaks. In May 2014 web intelligence firm Recorded Future published an interesting research on the use of encryption made by Al-Qaeda after the Snowden leaks. The study reported that members of Al-Qaeda are developing […]
Edward Snowden leaked a top-secret GCHQ document which details the operations and the techniques used by JTRIG unit for propaganda and internet deception. The JTRIGÂ unit of the British GCHQ intelligence agency has designed a collection of applications that were used to manipulate for internet deception and surveillance, including the modification of the results of the […]
Security experts Alexander Volynkin and Michael McCord will present at the next Black Hat 2014 a method to break Tor network anonymity with just USD 3000. Is the popular Tor network broken? In the recent months, after the Showden’s revelations, many security experts have started to investigate on the possibility that the US intelligence, and […]
The last collection of documents leaked by Snowden reveals the existence of the  RAMPART-A program which allows NSA to tap into fiber optic cables worldwide Snowden’s leaked documents have revealed the complex spying machine used by NSA to implement its surveillance program. The last collection of secret files, published on Wednesday by journalists at The Intercept and […]
Vodafone has recently issued the Law Enforcement Disclosure Report to reveal the existence of secret wires that allow state surveillance. Vodafone, one of the largest mobile carrier of the world has issued a document, titled “Law Enforcement Disclosure Report“, which describes the collaboration provided by the company to many governments for lawful interception for some of its 400 […]
A last revelation on the surveillance activities of British intelligence GCHQ confirms the existence of spy base tapping undersea cables in the Middle East. In the last year Edward Snowden has leaked many disconcerting documents for the surveillance activity conducted by the NSA and GCHQ intelligence agencies, the last revelation is related Britain covert spying programme, in particular the information on clandestine British base […]
Encryption Tool TrueCrypt shuts down mysteriously, a message on the official SourceForge-hosted page is encouraging users to adopt Microsoft Bitlocker. TrueCrypt, another myth is falling down? Many TrueCrypt users have had a nasty surprise visiting the TrueCrypt page at SourceForge, the page content warns visitors that the open source encryption software is not secure and that its […]
The demand for cyber security experts continues to raise, the US Government announced further investment to recruit new cyber talents with many difficulties. Cyber security is officially one of the first targets of every government, many countries announced huge investments to improve their cyber capabilities, a great effort that is having a significant impact on budgets and politics. […]
The last report issued by Chinaâs Computer Emergency Response Team (CNCERT) blames US for the majority of malware based attacks against the Chinese systems. There was once a dreaded China that violated the systems across the world and all the countries accused its cyber units to conduct aggressive and reckless hacking, today’s world politics discovered that US […]
Interesting vision on privacy issues related to the development of the paradigm of Big data. Who and how will manage a so precious mine of information? Discussions about issues created by the so called âBig Dataâ and the possibility to spy any information about our private life are more and more frequent. However, they have […]