UCR Today: Android Hacking// UC Riverside assistant professor is among group that develops novel method to attack apps on Android, and likely other, operating systems By Sean Nealon on August 20, 2014 illustration of smart phones and skull… Read More ›
Cyber Security
Edward Snowden’s not a one-off: US.gov hunts new secret doc leaker
Poor old Julian Assange – whistleblower went straight to Glenn Greenwald It appears former NSA contractor Edward Snowden is not the only leaker of secret US documents around, as the US government searches for another whistleblower in the aftermath of… Read More ›
FBI: We found US MILITARY AIRCRAFT INTEL during raid on alleged Chinese hacker
Accused of targeting F-22, F-35 and C-17 planes By Darren Pauli Posted in Security, 14th July 2014 07:29 GMT FBI: We found US MILITARY AIRCRAFT INTEL during raid on alleged Chinese hacker F-35 translated document allegedly stolen and shipped to… Read More ›
DARPA crazytech crew want to create HUMAN-FREE cyber defence systems
No need to call an infosec specialist – the machines will sort it all out By Jasper Hamill American secret squirrel military research outfit DARPA has launched a competition to find the autonomous cyber-defence systems of the future. More than… Read More ›
Navy Sailor Admits He Led a Hacking Group
By DAVID LEE (CN) – A former systems administrator in the nuclear reactor department of the aircraft carrier USS Harry S Truman has admitted leading hacking into more than 50 military, university and business computer systems to steal the identities… Read More ›
LA air traffic meltdown: System simply ‘RAN OUT OF MEMORY’
Maybe a reboot will fix it. Maybe a reboot will fix it. Maybe a reboot will fix it. Ma- By Jasper Hamill Posted in CIO, 12th May 2014 13:34 GMT A computer crash that caused the collapse of a $2.4bn… Read More ›
Australian government apps access smartmobe cams but ‘don’t film you’
Department of Human Services says its apps need cameras to deliver better services By Richard Chirgwin, 4 May 2014 Australia’s Department of Human Services (DHS) says apparently-excessive permissions sought by its mobile apps are necessary for service delivery, and don’t… Read More ›
Experts warn that the global shipping industry is vulnerable to cyber-attack
Experts warn that the global shipping industry is vulnerable to cyber-attack Security experts warn that the sector transporting 90 per cent of world trade is highly vulnerable PUBLISHED : Thursday, 24 April, 2014, 10:03pm The next hacker target appears likely… Read More ›
‘Heartbleed’ bug puts encrypted data in danger
Trust in the Internet took a major blow as alarm spread that software commonly used to encrypt and secure online transactions could wind up giving away the store. Computer security specialists, website masters, and fans of online privacy were worriedly… Read More ›
Home is where the Heartbleed is thanks to SSL in your modem
Vendors and ISPs have a lot of work to do updating firmware – if it possible to do so By Richard Chirgwin Posted in Security, 9th April 2014 02:36 GMT All over the world, systems administrators are scrambling to fix… Read More ›
Why CIA, NSA can’t spy on Putin?
Tuesday, 01 April 2014 Earlier this month, as Russia began its move in Crimea, U.S. spy agencies reportedly found a worrying silence in the spot where they were listening most attentively — the digital space around Russian President Vladimir Putin… Read More ›
Hacked Twitter accounts more valuable to cyber thieves than credit cards
Cyber thieves can make more money out of stolen Twitter credentials than from stolen credit card data on the black market, a report by the Research and Development Corporation (RAND) says. The survey called “Markets for Cybercrime Tools and Stolen… Read More ›
Hey, Glasshole: That cool app? It has turned you into a SPY DRONE
Google Glass spyware can use users as surveillance drones By John Leyden Security researchers have created prototype Google Glass spyware that is capable of snooping on everything the user is looking at without tipping off victims that anything is amiss…. Read More ›
Rise of robot reporters: when software writes the news
17:00 21 March 2014 by Aviva Rutkin Just three minutes after an earthquake hit California on Monday, the Los Angeles Times broke the story on its website. The short article seemed fairly ordinary. It covered all the major details –… Read More ›
Antisocial Network to help users avoid their friends
Friday, 21 March 2014 A pair of U.S. developers have created Cloak, an iPhone “antisocial network” to help users avoid running into their friends. Cloak, created by programmer Brian Moore and former Buzzfeed creative director Chris Baker, is billed as… Read More ›
NSA ‘records all phone conversations’ in unnamed target country ( MYSTIC )
US agency records every phone conversation in unnamed target nation, according to exiled whistle-blower Edward Snowden and others UPDATED : Thursday, 20 March, 2014, 4:23am The Washington Post NSA taps ‘all calls’ in one country. The US National Security Agency… Read More ›
Ukraine (cyber) war in full swing
2014-03-17 07:29 Kiev – With cyber attacks already launched against Crimean separatists, the Kremlin and Nato, the ground war may not have started in Ukraine but computer warfare is already raging. In recent days – and with increasing intensity on… Read More ›
USA gives up control of Internet
Friday, 14 March 2014 U.S. officials announced plans Friday to relinquish federal government control over the administration of the Internet, a move likely to please international critics but alarm some business leaders and others who rely on smooth functioning of… Read More ›
Turkish Graft Documents 17 DECEMBER OPERATION as leaked – Converted to PDF
EEV: Link here is to WordPress PDF file: 17 ARALIK OPERASYONU BAKANLAR FEZLEKESİ Egemen Bağış Zafer Çağlayan Muammer Güler Original leak source : The Twitter pseudonym @HARAMZADELER333 EEV: First post published below for linking: R A P O R Soruşturma No :… Read More ›
NSA’s TURBINE robot pumps ‘malware into MILLIONS of PCs’
Sysadmins, routers, criminals’ IRC botnets, and maybe terrorists, all for the pwning By Iain Thomson 12th March 2014 21:47 GMT The latest batch of top-secret intelligence documents from the hoard collected by NSA whistleblower Edward Snowden detail the massive increase in… Read More ›
Cyber attack on Russia hits India, secret defence documents leaked
Saikat Datta , Hindustan Times New Delhi, March 08, 2014 First Published: 21:03 IST(8/3/2014) | Last Updated: 22:06 IST(8/3/2014) A cyber attack on Russian communication systems by anonymous hackers on early Saturday morning has compromised India’s defence dealings with Russia… Read More ›
Suspected Russian spyware Turla targets Europe, U.S. ( Turla )
– A sophisticated piece of spyware has been quietly infecting hundreds of government computers across Europe and the United States in one of the most complex cyber espionage programs uncovered to date Reuters, 07/03 16:26 CET By Peter Apps and… Read More ›
Hacking Team snoopware found on US servers
– The governments named include Uzbekistan, Poland, Mexico, Colombia, Morocco, Thailand, the UAE, Korea* Morocco and Azerbaijan Citizen Lab tags foreign governments for spying in America By Richard Chirgwin 6th March 2014 05:01 GMT Canada’s Citizen Lab has added to its… Read More ›
Largest single personal data hack ever? 360mn stolen account credentials found online
Published time: March 01, 2014 01:31 Reuters / Kacper Pempel A cyber security firm has reported a “mind boggling” cache of stolen credentials which has been put up for sale on online black markets. A total of… Read More ›
Who holds the seven keys to the internet?
Meet the seven people who hold the keys to worldwide internet security It sounds like the stuff of science fiction: seven keys, held by individuals from all over the world, that together control security at the core of the web…. Read More ›
Yahoo webcam images from millions of users intercepted by GCHQ
• Optic Nerve program collected Yahoo webcam images in bulk • 1.8m users targeted by UK agency in six-month period alone • Yahoo: ‘A whole new level of violation of our users’ privacy’ • Material included large quantity of sexually… Read More ›
Wi-Fi Computer Virus goes Airborn like common cold
Thursday, 27 February 2014 Researchers in Britain have shown for the first time how a computer virus can spread through Wi-Fi “as efficiently as the common cold spreads between humans.” The ‘Chameleon’ Wi-Fi AP-AP virus infiltrates dense networks and… Read More ›
2029: the year when robots will have the power to outsmart their makers
Ray Kurzweil, Google expert in artificial intelligence, predicts that by 2029 robots will make jokes and flirt Nadia Khomani The Observer, Saturday 22 February 2014 16.00 EST Computers will be cleverer than humans by 2029, according to Ray Kurzweil, Google’s director… Read More ›
Beware Greeks bearing lists: Bank-raiding nasty Zeus smuggles attack orders in JPEGs
EEV: _ Very Well Placed Malware_ Trojan stashes config files in photos in mythology mash-up By Iain Thomson Posted in Security, 20th February 2014 20:12 GMT A new variant of the bank-account-raiding Zeus malware apparently uses the ancient technique of steganography to… Read More ›
‘I always wonder if someone is listening’: NSA spied on American lawyers but sometimes got other governments to do the work for them
U.S. law firm advising Indonesia’s government on trade issues was spied on by a foreign government Spying was done by Australia which then passed the info onto the NSA Law firm involved not identified in the latest documents The NSA… Read More ›
10 Technologies That Could Enslave Humanity
Terminator is a true story. Find out how we’re all doomed in 10 technologies that could enslave humanity.
Hackers used previously unknown Internet Explorer flaw in new attacks
– He said planting backdoors on the machines of VFW members and site visitors to collect military intelligence was a possible goal. Source: Reuters – Fri, 14 Feb 2014 01:25 AM Author: Reuters By Joseph Menn SAN FRANCISCO, Feb 13… Read More ›
DARPA developing ultimate web search engine to police the internet
Published time: February 12, 2014 22:35 Reuters / Umit Bektas The Pentagon’s research arm that fosters futuristic technology for the military will soon begin working to surpass current abilities of commercial web search engines. Yet, once it masters… Read More ›
‘Elite’ hacking operation ‘The Mask’ targeted govts, diplomats for 7 years
Published time: February 10, 2014 23:05 Image by Kaspersky Labs Researchers recently detected a highly sophisticated cyber spying operation, active since 2007, that targeted governments, diplomats, and embassies before it was razed last month. Kaspersky Labs in Russia identified the… Read More ›
The gadget that can hack any CAR: Terrifying £12 tool can remotely control headlights, locks, steering and even brakes
Gadget is fitted to the Controller Area Network (CAN) of a modern car Depending on the make of car, the CAN controls lights, locks and brakes Hackers claim it can be fitted to any car’s network ‘within five minutes’ CAN… Read More ›
Affordable Care Act Software ongoing investigation, if the software was written in Belarus
U.S. says no evidence Obamacare software written in Belarus Hayden confirmed that a U.S. intelligence agency had recently issued, then retracted, a report related to possible involvement by a Belarus company in writing the software. Valery Tsepkalo, director of the… Read More ›
Microsoft, Facebook, Google and Yahoo release US surveillance requests
• Tech giants turn over data from tens of thousands of accounts • Limited disclosure part of transparency deal made last month Spencer Ackerman in Washington and Dominic Rushe in New York theguardian.com, Monday 3 February 2014 16.40 EST Microsoft,… Read More ›
This tool demands access to YOUR ENTIRE DIGITAL LIFE. Is it from GCHQ? No – it’s by IKEA
Order a flat-pack kitchen, surrender your HDD’s contents By Richard Chirgwin, 29th January 2014 If the Target hack – along with all its predecessors – taught us anything, it’s that the database isn’t the vulnerability. It’s the data that’s… Read More ›
ATM security alert as Microsoft prepares to kill off Windows XP
Microsoft to cease support for Windows XP on April 8th Experts believe only 95% of ATMs run the software Could leave machines vulnerable to hackers By Mark Prigg PUBLISHED: 19:42 EST, 17 January 2014 Cashpoints around the world could be… Read More ›
‘A hacker’s wet dream:’ ‘World’s most wanted hacker’ SLAMS Obamacare website security
– Healthcare.gov retrieves information from numerous third-party databases belonging to the IRS, Social Security Administration, Department of Homeland Security, and other State agencies – it’s clear that the management team did not consider security as a priority – A breach may result… Read More ›
Net neutrality is now DEAD
– Internet providers may be able to offer faster connections to preferred websites, or even block competitors – This ruling, if it stands, will adversely affect the daily lives of Americans and fundamentally change the open nature of the internet,… Read More ›
Millions of visitors to Yahoo.com hit by huge malware attack
Ads from Yahoo are redirecting users to sites that install a host of different malware IT security firm Fox IT estimates that up to 29,000 computers per hour were affected Yahoo says it is aware of the problem and working… Read More ›
NSA statement does not deny ‘spying’ on members of Congress
– Senator Asked the Question ” about whether it “has spied, or is … currently spying, on members of Congress or other American elected officials” • Agency responds to questions from Senator Bernie Sanders • Statement cites ‘same privacy protections as… Read More ›
NSA Warns of Rogue System Administrators 1996 / Irony?
EEV: Thank you to Cryptome for bringing attention to this. .. I decided to post the first page of the FOIA release, just to display the declassification date. A few out there will recognize the Irony 😉 4 January 2014 A… Read More ›
The Actual NSA’s Spy Catalog
EEV: As Promised, in no particular order. This information already has been fully compromised internationally, over the past few days.
U.S. House to mull proposals to make Obamacare website more secure
– experts warned Congress in November that the Obamacare website had so many security flaws that it was putting people’s data at risk and should be shut down until it is fixed. Source: Reuters – Thu, 2 Jan 2014 11:40… Read More ›
Shopping for Spy Gear / Catalog Advertises NSA Toolbox
By Jacob Appelbaum, Judith Horchert and Christian Stöcker After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices. Editor’s note:… Read More ›
China-made software collects text data without users’ knowledge
The government’s National Information Security Center has warned about 140 organisations, not to use a Japanese input method editor developed by Baidu Inc.ch. Yomiuri Shimbun/ANN | 26-12-13 The government’s National Information Security Center has warned about 140 organisations, including… Read More ›