surveillance

Apple restores certificate validation checks mysteriously missed

Apple released a security update to iOS that restores some certificate-validation checks that had apparently been missing for an unspecified…

12 years ago

WhatsApp lack enforcing certificate pinning, users exposed to MITM

Experts at Praetorian have been conducting the Project Neptune to assess the security for designing and maintenance of mobile apps,…

12 years ago

Unclassified NSA memorandum provides further details on Snowden case

An unclassified NSA memorandum disclosed by the NBC News reveals Snowden allegedly managed to access classified documentation stealing coworker's passwords.…

12 years ago

Snowden has leaked secret documents with a common web crawler

According an internal investigation Snowden has leaked the secret NSA'documents using a web crawler software designed to search, index and…

12 years ago

Sochi visitors Hacked in few minutes to prevent attacks

According to NBC News, Olympics attendees are being hacked just the arrive in Sochi,  the reporter Richard Engel demonstrated it…

12 years ago

Admiral Rogers chosen as new NSA director.The man of Information Warfare

The Obama Administration will assign the command of NSA to Michael S. Rogers, the US Government has chosen a military…

12 years ago

CDM Jan 2014 is out for free – Welcome 2014: The Year of Mobile Spying and Privacy Concerns

Cyber Defense Magazine (CDM) CYBER WARNINGS JANUARY 2014 EDITION is available for free. Yes, 2014 is here and we’re surrounded by…

12 years ago

Time for a Cybersecurity Overhaul

A post on cybersecurity written by Larry Karisny, director of ProjectSafety.org,a cybersecurity expert,advisor,consultant, writer and industry speaker. Most of the…

12 years ago

FBI seized Tormail database, it has the access to all users emails

The Federal Bureau of Investigation (FBI) seized the database of Tormail service for its investigation on cybercrime and illegal online…

12 years ago

Who is spying on Tor network exit nodes from Russia?

Researchers Winter and Lindskog identified 25 nodes of Tor network that tampered with web traffic, decrypted the traffic, or censored…

12 years ago

This website uses cookies.