Agents said to have intercepted 70 million calls and text messages a month France had previously blamed the United States of America US was first suspected of hacking into Nicolas Sarkozy’s phone in 2012 By Nabila Ramdani PUBLISHED: 11:32 EST,… Read More ›
Cyber Security
Malware infected International Atomic Energy Agency Computers
Wang Wei, The Hacker News – Tuesday, October 22, 2013 Hackers and malware are everywhere, waiting for you around every corner of the Internet. The International Atomic Energy Agency (IAEA), which holds highly sensitive information and plays a key… Read More ›
Mozilla’s Lightbeam tool will expose who is looking over your shoulder on the web
Adam Sherwin Thursday, 24 October 2013 Just who is looking over your shoulder when you browse the Internet? Tomorrow, web users will be given a new tool to shine a light on the commercial organisations which track your every… Read More ›
Europe Furious Over US Spying Allegations ” Worse than Orwell’s 1984 ” Emergency meeting Called
‘Out of Hand’ The newest allegations of US spying have unleashed a torrent of criticism and concern in Europe. If suspicions unearthed by SPIEGEL that the US tapped Chancellor Merkel’s cell phone turn out to be true, the ramifications for… Read More ›
Call yourself a ‘hacker’, lose your 4th Amendment right against seizures
Court rules coder’s PC can be snatched in ‘software knockoff’ spat By John Leyden Posted in Law, 23rd October 2013 23:19 GMT A US district court has ruled that anyone calling themselves a “hacker” loses their Fourth Amendment protections… Read More ›
NSA-friendly cyber-slurp law CISPA back on the table with new Senate bill
Unsurprisingly with spooks’ full support By Iain Thomson Posted in Law, 22nd October 2013 19:33 GMT The Cyber Intelligence Sharing and Protection Act (CISPA), which allows private companies to share customer information with the NSA and others in the… Read More ›
South Korean Cyber Unit Probed Over Election Meddling
Oct. 22, 2013 – 07:26PM | By AGENCE FRANCE-PRESSE | South Korean President Park Geun-Hye attends the 16th ASEAN-Korea summit in Brunei on Oct. 9. The country’s defense ministry has acknowledged that four members of the cyber unit had posted… Read More ›
Krebs alleges, Experian was duped into selling personal information about millions of Americans by a scammer.
Fraudster bought names and address from Experian, says Krebs Data broker duped By Richard Chirgwin Posted in Security, 22nd October 2013 02:30 GMT Brian Krebs alleges a subsidiary of data aggregator Experian was duped into selling personal information about… Read More ›
Kimsuky And The Secret Menace
October 21, 2013: Internet security researchers recently announced they had identified a new group of hackers operating out of North Korea. Calling this group Kimsuky, it has been active for about six months and has targeted universities, shipping companies and… Read More ›
US spy agency snooped on French citizens: Report ( code-named “US-985D” )
AFP Monday, Oct 21, 2013 PARIS – The US National Security Agency (NSA) secretly recorded millions of phone calls made in France, daily Le Monde reported on Monday, citing documents from former intelligence contractor Edward Snowden. The spy agency taped… Read More ›
NSA Accessed Mexican President’s Email
By Jens Glüsing, Laura Poitras, Marcel Rosenbach and Holger Stark The NSA has been systematically eavesdropping on the Mexican government for years. It hacked into the president’s public email account and gained deep insight into policymaking and the political system…. Read More ›
Obamacare sites pirated copyrighted web scripts
Published time: October 18, 2013 16:52 Edited time: October 19, 2013 17:40 Screenshot from healthcare.gov The list of complaints waged at the White House over its Healthcare.gov site continues to grow, but the latest incident involving the online home… Read More ›
Leaky security could scuttle global ship-tracking system / Nuke-carrying Iranian ghost ships could be on the USA’s radar right now
By Phil Muncaster 17th October 2013 06:28 GMT Security researchers have found a major flaw in the Automatic Identification System (AIS), a mandatory tracking system for ships, which could leave the 400,000 vessels currently using it globally wide open to… Read More ›
Easily picked CD-ROM drive locks let Mexican banditos nick ATM cash
Who needs an inside man when you’ve got a boot disc? By John Leyden 11th October 2013 15:12 GMT Lax security at Mexican banks has allowed cybercriminals to put their own malware-ridden CDs into ATM machines in order… Read More ›
Several top websites use device fingerprinting to secretly track users ( free tool will be available to detect it ) – Please share this article
A new study by KU Leuven-iMinds researchers has uncovered that 145 of the Internet’s 10,000 top websites track users without their knowledge or consent. The websites use hidden scripts to extract a device fingerprint from users’ browsers. Device fingerprinting… Read More ›
Laptops Snowden took to Hong Kong, Russia were a “diversion”
Source: Reuters – Fri, 11 Oct 2013 04:42 PM Author: Reuters By Mark Hosenball WASHINGTON, Oct 11 (Reuters) – The four laptop computers that former U.S. spy contractor Edward Snowden carried with him to Hong Kong and Moscow were a… Read More ›
UK bankers prep for cyberwar: Will simulate ATTACK on system
One-day op will test stock market, payment bods’ resistance to hackers By John Leyden Posted in Security, 8th October 2013 07:27 GMT UK banks, the stock market and payment providers will undergo extensive stress tests in November that are designed… Read More ›
The Threat Becomes Less Mysterious And More Scary / Operation Icefog APT, SpearFishing, Hidden Linx, Aurora, Red October, DarkSeoul, Shadow Network, SEA
October 6, 2013: The international hacker community is becoming less mysterious. Over the last decade Internet security firms (especially Kaspersky Labs and Symantec) have been increasingly successful at identifying the hacker organizations responsible for some of the large-scale hacker attacks… Read More ›
China pays 2 million people to monitor Internet
05 Oct 2013 Beijing (AFP) China is employing two million people to keep tabs on people’s Internet use, according to state media, in a rare glimpse into the secret world of Beijing’s vast online surveillance operation. Many of the employees are… Read More ›
US indicts 13 suspected members of Anonymous hacking collective
Indictment filed in US district court in Virginia charges that members attacked government and credit card websites Reuters in Washington theguardian.com, Thursday 3 October 2013 17.15 EDT The loose-knit international group known as Anonymous has been in frequent battle with… Read More ›
Iranian cyber warfare commander shot dead in suspected assassination
The head of Iran’s cyber warfare programme has been shot dead, triggering further accusations that outside powers are carrying out targeted assassinations of key figures in the country’s security apparatus. The killing of Ahmadi coincides with a new diplomatic effort… Read More ›
Hacking firm hints at cybercrime’s professional elite ( Cyber-Mercenaries Hidden Lynx )
27 September 2013 by Hal Hodson Magazine issue 2936. Subscribe and save For similar stories, visit the Computer crime Topic Guide A new report has outed a shadowy organisation called Hidden Lynx – a 100-strong group of expert hackers who… Read More ›
Tinfoil hat brigade say every PC is on mobile networks, even when powered down ( zero-power-consumption on-chip 3G )
‘Occupy’ affiliate claims Intel bakes SECRET 3G radio into vPro CPUs Tinfoil hat brigade say every PC is on mobile networks, even when powered down By Richard Chirgwin Posted in Security, 23rd September 2013 02:29 GMT Intel has apparently turned up… Read More ›
UK’s GCHQ blamed for cyber attack on Belgian telecoms company
The agency was named in the latest revelations from NSA whistleblower Edward Snowden Cahal Milmo Friday, 20 September 2013 Britain is facing a damaging public clash with a European ally after GCHQ was blamed for a cyber attack on Belgium’s… Read More ›
NSA boss ‘built replica Star Trek bridge’ while spying on THE WORLD?
Want to sit in Picard’s chair while spying on THE WORLD? We can make it so – ex-NSA man Tells magazine that NSA boss ‘built replica Star Trek bridge’ By John Leyden Posted in Security, 16th September 2013 14:03 GMT… Read More ›
NSA Monitors Financial World
‘Follow the Money’ By Laura Poitras, Marcel Rosenbach and Holger Stark The NSA monitors banks and credit card transactions — sometimes in apparent violation of national laws and global regulations. The European SWIFT financial transaction network is being tapped on… Read More ›
(U//FOUO) U.S. Army Cyber/Electromagnetic Contest Capabilities Based Assessment (C/EM CBA) V0.9
EEV: Old but still of interest September 9, 2013 in U.S. Army The following documents were obtained from the website of the Cyber Conflict Studies Association. The documents are draft capabilities based assessments (CBA) of the U.S. Army’s efforts in… Read More ›
Yahoo chief Marissa Mayer said she feared winding up in prison for TREASON if she refused to comply with US spy demands for data
Yahoo CEO fears defying NSA could mean prison 12 Sep 2013 SAN FRANCISCO (AFP) Yahoo chief Marissa Mayer said she feared winding up in prison for treason if she refused to comply with US spy demands for data. Her comments… Read More ›
Jail time promised for false tweets in China
Xinhua will escape from Olympic 2020 gaffe, no doubt By Phil Muncaster Posted in Policy, 10th September 2013 04:09 GMT Use of social media in China just got more dangerous after the country’s Supreme Court announced tough new guidelines… Read More ›
NSA and GCHQ unlock encryption used to protect emails, banking and medical records • $250m-a-year US program works covertly with tech companies to insert weaknesses into products • Security experts say programs ‘undermine the fabric of the internet’
US and UK spy agencies defeat privacy and security on the internet James Ball, Julian Borger and Glenn Greenwald The Guardian, Thursday 5 September 2013 15.00 EDT Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into… Read More ›
The spy device that really is ‘undercover’: Vest scans nearby mobiles to track them and steal an owner’s personal details
Images from surveillance brochures have been leaked online The instruments are thought to be next-generation spy gadgets Vest can capture a phone’s unique identifier number and track its location Memory stick can steal network username and password By Victoria Woollaston… Read More ›
REVEALED: Secret program gives federal agents nearly instant access to BILLIONS of AT&T phone records without a court order
Hemisphere program allows federal agents to access details on rolling database of 4billion calls a day that are process through AT&T switches Secret program in place since 2007 includes records dating back to 1987 Federal agents can issue ‘administrative subpoena’… Read More ›
Chinese authorities say massive DDoS attack took down .cn domain
Middle Kingdom pledges immediate action By Iain Thomson Posted in Security, The China Internet Network Information Center (CINIC) has reported that on Sunday it suffered the largest ever DDoS attack it has ever experienced against the .cn domain, an… Read More ›
Hacks continue as FBI claims to have dismantled Anonymous
The FBI is claiming to have dismantled the hacker organization Anonymous. But shortly after an official’s statements were published in the press, Anons dumped large amounts of data that appears to have been stolen from FBI servers. A graffiti of… Read More ›
US spy agency broke encryption on UN communications – report
© Collage: Voice of Russia The US National Security Agency broke the encryption securing the United Nations’ internal video conferencing at its New York headquarters, German news weekly Der Spiegel reported Sunday, citing secret NSA documents. 0The move provided the… Read More ›
Germany warns: You just CAN’T TRUST some Windows 8 PCs
Microsoft: You can still buy an ‘insecure’ Win 8 machine sans TPM chip By Jasper Hamill 23rd August 2013 10:38 GMT Microsoft’s new touchy Windows 8 operating system is so vulnerable to prying hackers that Germany’s businesses and… Read More ›
NSA officers ‘spy on love interests’
The spying has been given the codename ‘LOVEINT’ LOVEINT has been going on for at least the past decade This revelation is the latest in a summer of disclosures about how far the US government spy program reaches By Ryan… Read More ›
NSA paid millions to cover Prism compliance costs for tech companies
• Top-secret files show first evidence of financial relationship • Prism companies include Google and Yahoo, says NSA • Costs were incurred after 2011 Fisa court ruling Ewen MacAskill in New York The Guardian, Thursday 22 August 2013… Read More ›
Internet Companies Paid Millions for Spying Activity
By NICK DIVITO (CN) – The National Security Agency paid millions of dollars to Internet companies like Google, Yahoo!, Microsoft and Facebook to cover costs of its PRISM surveillance program, according to secret documents obtained by The Guardian and… Read More ›
Four ways the Guardian could have protected Snowden – by THE NSA
Spooks’ own advice lays out exactly how this crypto wypto hypto thing works By Chris Williams Posted in Security, 22nd August 2013 11:38 GMT Analysis The Guardian‘s editor-in-chief Alan Rusbridger fears journalists – and, by extension, everyone – will… Read More ›
Possessed baby monitor shouts obscenities at Texas tot
‘Somewhat of a blessing’ the child is deaf, say parents By Iain Thomson Posted in Security, 14th August 2013 23:26 GMT A Texas father ripped out the baby video monitor he’d installed to watch over his two year-old daughter after… Read More ›
Hackers expected to unleash viruses on Windows XP in 2014 When support for the operating system stops, users will no longer receive updates to fix the exploits.
By Leo Boon Yeow, Hardware Zone | 14-08-13 According to a report by Computerworld, hackers have been storing Windows XP zero-day vulnerabilities that they have discovered, with the intent of unleashing them on XP users the moment Microsoft… Read More ›
NSA gets burned by a sysadmin, decides to burn 90% of its sysadmins
Need to end planet-wide-snooping leaks? That’ll do the trick, thinks US spymaster By Jasper Hamill 9th August 2013 11:23 GMT The NSA has announced its brainwave to end further leaks about its secret operations by disaffected employees: it… Read More ›
Revealed: How the NSA will spy on you if you just put the word Osama in an email, text message or Facebook chat
An message sent to a cousin named Osama may now be enough to make any American a target of surveillance The information was couched in a set of rules leaked by Edward Snowden about a 2008 domestic surveillance law The… Read More ›
Drawing the Line on Altering Human Minds
August 6, 2013, 2:14 pm <!– — Updated: 3:42 pm –> By NICK BILTON In my column this week, “Computer-Brain Interfaces Making Big Leaps,” I noted that a number of researchers and scientists were coming closer to technology usually reserved… Read More ›
FBI pushes internet providers to install new spy system
© Flickr.com/dnewman8/cc-by The Federal Bureau of Investigation is pressuring internet providers to install software to intercept online metadata in real time. In its demands the agency appeals to the Patriot Act, which authorizes surveillance programs used by the US secret… Read More ›
Chinese Hackers Caught by US water control system Honeypots
Author: Mohit Kumar, The Hacker News – Monday, August 05, 2013 A notorious Chinese hacker collective known as APT1 or Comment Crew, possibly linked to the Chinese Army, have been caught red handed breaking into a fake United States water… Read More ›
Military Tests Data Mining of Social Media for Special Ops “QUANTUM LEAP”
August 6, 2013 Steven Aftergood Intelligence, Secrecy Updated belowThe U.S. military has been investigating the use of sophisticated data mining tools to probe social media and other open sources in order to support military operations against money laundering, drug trafficking,… Read More ›
Hey, you know Android apps can ‘access ALL’ of your Google account?
One-click login hands over keys to Gmail, Google Drive et al, says researcher By Bill Ray Posted in Security, 6th August 2013 13:03 GMT The single-click Google account login for Android apps is a little too convenient for… Read More ›
Secret US drug agency unit passing surveillance information to authorities ( Special Operations Division, or SOD )
Wiretaps and telephone records are being funnelled across the country to launch criminal investigations of Americans Reuters in Washington theguardian.com, Monday 5 August 2013 10.38 EDT Federal agents are trained to ‘recreate’ the investigative trail to effectively cover up… Read More ›