Terrorism

Terrorism WEEKLY DIGEST – THREAT INTELLIGENCE FEED – MAY 24th – 30th 2016Terrorism WEEKLY DIGEST – THREAT INTELLIGENCE FEED – MAY 24th – 30th 2016

Terrorism WEEKLY DIGEST – THREAT INTELLIGENCE FEED – MAY 24th – 30th 2016

From today, Global Intelligence Insight, working with SecurityAffairs and SecurityMediaPublishing will deliver a weekly report on issues in Syria and…

9 years ago
Journalists get scammed trying to buy an AK47 in the Dark WebJournalists get scammed trying to buy an AK47 in the Dark Web

Journalists get scammed trying to buy an AK47 in the Dark Web

Producers from the German broadcaster ARD have conducted an interesting experiment to demonstrate how to buy a weapon on the…

9 years ago
Covert Communication Techniques Used By Next Gen High Tech TerroristsCovert Communication Techniques Used By Next Gen High Tech Terrorists

Covert Communication Techniques Used By Next Gen High Tech Terrorists

With the advent of technology, terrorists have changed their strategies and converted themselves into high-tech & sophisticated groups. “While Osama…

9 years ago
How terrorists abuse online services for propaganda?How terrorists abuse online services for propaganda?

How terrorists abuse online services for propaganda?

Researchers at TrendMicro have analyzed online activities of terrorists identifying the techniques and tools used for their propaganda. Using vulnerabilities…

9 years ago
Isis hackers claim to have infiltrated the UK Ministry of DefenceIsis hackers claim to have infiltrated the UK Ministry of Defence

Isis hackers claim to have infiltrated the UK Ministry of Defence

Pro-ISIS hackers belonging to the Islamic State Hacking Division group brag they have planted a mole at the heart of…

9 years ago
Governance rules give more cyber power to the EuropolGovernance rules give more cyber power to the Europol

Governance rules give more cyber power to the Europol

The European Parliament’s civil liberties committee has approved new governance rules that give Europol new cyber powers to tackle down…

9 years ago
Pro-ISIS Hackers issued Kill List Of US Gov personnelPro-ISIS Hackers issued Kill List Of US Gov personnel

Pro-ISIS Hackers issued Kill List Of US Gov personnel

Pro-ISIS hackers belonging to the United Cyber Caliphate issue a kill list that includes dozens of U.S. government personnel. A…

9 years ago
The US Cyber Command started the attacks on the Islamic StateThe US Cyber Command started the attacks on the Islamic State

The US Cyber Command started the attacks on the Islamic State

The US Government has announced to have launched a series of cyber attacks against the Islamic State coordinated by the…

9 years ago
The CIA’s Massive Expansion in Social Media Surveillance is Just the Tip of the IcebergThe CIA’s Massive Expansion in Social Media Surveillance is Just the Tip of the Iceberg

The CIA’s Massive Expansion in Social Media Surveillance is Just the Tip of the Iceberg

The US intelligence is massively expanding in Social Media surveillance pushing new technologies, including artificial intelligence for data mining In-Q-Tel,…

9 years ago
Homeland Security – US Consular Consolidated Database vulnerable to cyber attacksHomeland Security – US Consular Consolidated Database vulnerable to cyber attacks

Homeland Security – US Consular Consolidated Database vulnerable to cyber attacks

According to the results of an internal review, the US passport and visa Consular Consolidated Database (CCD)  database is open…

9 years ago