surveillance

Pierluigi Paganini February 24, 2014
Apple restores certificate validation checks mysteriously missed

Apple released a security update to iOS that restores some certificate-validation checks that had apparently been missing for an unspecified amount of time. Last week Apple released a security update to iOS (iOS 7.06) to fix a flaw for certificate-validation checks that could be abused by attackers to conduct a man-in-the-middle attack within the victim’s network  to capture or modify […]

Pierluigi Paganini February 22, 2014
WhatsApp lack enforcing certificate pinning, users exposed to MITM

Experts at Praetorian have been conducting the Project Neptune to assess the security for designing and maintenance of mobile apps, including WhatsApp. This week the IT was shocked by the acquisition of WhatsApp by Facebook, the popular mobile messaging service was sold for $19 billion, probably this is the value assigned to the information managed by […]

Pierluigi Paganini February 14, 2014
Unclassified NSA memorandum provides further details on Snowden case

An unclassified NSA memorandum disclosed by the NBC News reveals Snowden allegedly managed to access classified documentation stealing coworker’s passwords. The hypothesis that Edward Snowden has operated using a simple web-crawler is very curious, how is it possible that a lonely consultant had access to a so huge collection of documents from NSA archives? Why Does […]

Pierluigi Paganini February 10, 2014
Snowden has leaked secret documents with a common web crawler

According an internal investigation Snowden has leaked the secret NSA’documents using a web crawler software designed to search, index and backup a website. The last assumption of the Snowden case is related to the way the whistleblower has collected the huge quantity of secret document from the National Security Agency (NSA). The leaked documents have shown […]

Pierluigi Paganini February 07, 2014
Sochi visitors Hacked in few minutes to prevent attacks

According to NBC News, Olympics attendees are being hacked just the arrive in Sochi,  the reporter Richard Engel demonstrated it conducting an experiment. Sochi Olympics are starting, but Intelligence agencies of all participating governments fear the possibility of an terrorist attack or a cyber attack. The event is a great occasion for hackers, hacktivists and cyber criminals which […]

Pierluigi Paganini February 02, 2014
Admiral Rogers chosen as new NSA director.The man of Information Warfare

The Obama Administration will assign the command of NSA to Michael S. Rogers, the US Government has chosen a military Expert on Information Warfare. The Obama Administration will assign the command of NSA to Michael S. Rogers, presently the U.S Navy’s Cyber Security Chief, will be the new Director of the National Security Agency (NSA) and […]

Pierluigi Paganini February 01, 2014
CDM Jan 2014 is out for free – Welcome 2014: The Year of Mobile Spying and Privacy Concerns

Cyber Defense Magazine (CDM) CYBER WARNINGS JANUARY 2014 EDITION is available for free. Yes, 2014 is here and we’re surrounded by more and more personally identifiable information (PII) theft, as predicted. Keep an eye on these at http://www.privacyrights.org and find out that we all have common  vulnerabilities and exposures (CVEs) which are searchable here at the National Vulnerability Database […]

Pierluigi Paganini January 29, 2014
Time for a Cybersecurity Overhaul

A post on cybersecurity written by Larry Karisny, director of ProjectSafety.org,a cybersecurity expert,advisor,consultant, writer and industry speaker. Most of the recent attention on cybersecurity has been directed toward the disclosure of NSA activities and recent corporate breaches now reaching record-breaking levels. Both the public and private sectors are beginning to witness how devastating cyber breaches […]

Pierluigi Paganini January 28, 2014
FBI seized Tormail database, it has the access to all users emails

The Federal Bureau of Investigation (FBI) seized the database of Tormail service for its investigation on cybercrime and illegal online hacking. Do you have used the Tormail Email service to protect your privacy? Are you searching for anonymity online? Well, the revelation regarding Tor Stinks project and many recent news on the spying activity discovered on Tor Traffic made […]

Pierluigi Paganini January 23, 2014
Who is spying on Tor network exit nodes from Russia?

Researchers Winter and Lindskog identified 25 nodes of Tor network that tampered with web traffic, decrypted the traffic, or censored websites. Two researchers, Philipp Winter and Stefan Lindskog of Karlstad University in Sweden, presented the results of a four-month study  conducted to test Tor network exit nodes for sneaky behavior, it has been discovered that a not specified Russian […]