surveillance

Pierluigi Paganini September 23, 2013
Chaos Computer Club claims to have defeated Apple TouchID

Chaos Computer Club claims to have bypassed the biometric security technology Apple TouchID by making a copy of a fingerprint photographed on a glass surface. Hackers members of the Chaos Computer Club claim to have defeated Apple TouchID fingerprint sensor for the iPhone 5S, just after the start of its sale to the public. The Chaos Computer Club in […]

Pierluigi Paganini September 19, 2013
NSA tried to insert backdoor into Linux

Linux Torvalds during last LinixCon admitted to have received pressure from US Intelligence to insert a backdoor into Linux. Linux Torvalds during a question-and-answer ‪session ‬at ‪the LinuxCon publicly admitted that the US Government requested him to insert a backdoor into Linux kernel. The circumstance must induce a reflection in all those experts that believe open […]

Pierluigi Paganini September 19, 2013
Goolge has access to WiFi passwords stored in Android mobile devices

Google might have the access to WiFi passwords of customers stored in Android mobile devices due a built-in feature in the Android OS. Google company might know every WiFi password in the world used by every single Android user, and extraordinary amount of sensitive data could be exposed. According a Michael Horowitz post published on […]

Pierluigi Paganini September 09, 2013
Surveillance – NSA can access data on your mobile device

The German news agency Der Spiegel reported last act of US surveillance, the NSA is able to access data stored in a wide range of mobile devices including Android, iPhone and BlackBerry. Here we are with weekly news on NSA surveillance activities, last week we were shocked by the news on Bullrun program meanwhile today we discuss on the capability of the agency to access data stored […]

Pierluigi Paganini September 07, 2013
NSA Bullrun program, encryption and false perception of security

Revelations on Bullrun program demonstrated that NSA has capabilities against widely-used online protocols such as HTTPS and encryption standards. The latest nightmare for US Administration is named Bullrun, another US program for massive surveillance. Snowden‘s revelations represented a heartquake for IT security, the image of NSA and US IT companies are seriously compromised such the trust of worldwide […]

Pierluigi Paganini September 03, 2013
Traffic Correlation Attacks against Anonymity on Tor

The researchers led by Aaron Johnson of the Naval Research Laboratory published the paper on Traffic Correlation Attacks against Anonymity on Tor. Anonymity on Tor network is the primary reason for the use of the popular network, hacktivists, whistleblowers, hackers, and cybercriminals are enticed by the possibility to be not traceable. Straying far from prying eyes is the primary attraction for the user of  Tor project. In reality […]

Pierluigi Paganini August 31, 2013
PRISM repercussion on the Tor network accesses

The article proposes the analysis of the impact on the use of the Tor network after the events related to PRISM surveillance program disclosure. The use of Tor Network to preserve user’s anonymity and to avoid government surveillance, we discussed this topic several times explaining that through the analysis of Tor metrics data it was possible to […]

Pierluigi Paganini August 06, 2013
Firefox Zero-day exploited against Tor anonymity

Security researchers found a malicious script that takes advantage of a Firefox Zero-day to identify some users of the Tor anonymity network. My readers know very well Tor network and the capability of the system to remain anonymous under specific conditions. We have used terms such as Deep Web, Dark web and hidden web to remark […]

Pierluigi Paganini July 20, 2013
Anonymous leaked incorrect credentials of Congress members

Alleged members of the hacker collective Anonymous posted alleged passwords of Hill staffers, but according expert they are outdated and inaccurate. Anonymous claimed to have stolen credentials of members of Congress to protest against the popular surveillance program PRISM. Anonymous is back and once again it targeted US institutions, the group leaked over 2000 username […]

Pierluigi Paganini July 16, 2013
Researchers can hack Verizon Wireless femtocells to spy on customers

Two security researchers announced that they have succeeded to transform Verizon mobile phones into spy tools to track Verizon’s users. The security experts revealed to the Reuters agency that it is possible to hack Verizon mobile phones for surveillance purpose, the researchers will present the discovery during the next hacking conferences this summer, the DEF […]