Category: Cyber Security

Kimsuky And The Secret Menace

October 21, 2013: Internet security researchers recently announced they had identified a new group of hackers operating out of North Korea. Calling this group Kimsuky, it has been active for about six months and has targeted universities, shipping companies and groups encouraging Korean unification. What made Kimsuky stand […]

NSA Accessed Mexican President’s Email

By Jens Glüsing, Laura Poitras, Marcel Rosenbach and Holger Stark The NSA has been systematically eavesdropping on the Mexican government for years. It hacked into the president’s public email account and gained deep insight into policymaking and the political system. The news is likely to hurt ties between […]

Obamacare sites pirated copyrighted web scripts

Published time: October 18, 2013 16:52  Edited time: October 19, 2013 17:40                                                                             Screenshot from healthcare.gov The list of complaints waged at the White House over its Healthcare.gov site continues to grow, but the latest incident involving the online home of the Affordable Care Act is one that […]

Leaky security could scuttle global ship-tracking system / Nuke-carrying Iranian ghost ships could be on the USA’s radar right now

  By  Phil Muncaster 17th October 2013 06:28 GMT Security researchers have found a major flaw in the Automatic Identification System (AIS), a mandatory tracking system for ships, which could leave the 400,000 vessels currently using it globally wide open to terrorists or pirates. Trend Micro’s Kyle Wilhoit and […]

Several top websites use device fingerprinting to secretly track users ( free tool will be available to detect it ) – Please share this article

            A new study by KU Leuven-iMinds researchers has uncovered that 145 of the Internet’s 10,000 top websites track users without their knowledge or consent. The websites use hidden scripts to extract a device fingerprint from users’ browsers. Device fingerprinting circumvents legal restrictions imposed on the use of […]

The Threat Becomes Less Mysterious And More Scary / Operation Icefog APT, SpearFishing, Hidden Linx, Aurora, Red October, DarkSeoul, Shadow Network, SEA

October 6, 2013: The international hacker community is becoming less mysterious. Over the last decade Internet security firms (especially Kaspersky Labs and Symantec) have been increasingly successful at identifying the hacker organizations responsible for some of the large-scale hacker attacks on business and government networks. These commercial security […]

NSA Monitors Financial World

‘Follow the Money’ By Laura Poitras, Marcel Rosenbach and Holger Stark The NSA monitors banks and credit card transactions — sometimes in apparent violation of national laws and global regulations. The European SWIFT financial transaction network is being tapped on different levels, internal documents from the US spy […]

NSA and GCHQ unlock encryption used to protect emails, banking and medical records • $250m-a-year US program works covertly with tech companies to insert weaknesses into products • Security experts say programs ‘undermine the fabric of the internet’

US and UK spy agencies defeat privacy and security on the internet James Ball, Julian Borger and Glenn Greenwald The Guardian,   Thursday 5 September 2013 15.00 EDT Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into encryption software. Photograph: Kacper Pempel/Reuters US and British […]

The spy device that really is ‘undercover’: Vest scans nearby mobiles to track them and steal an owner’s personal details

Images from  surveillance brochures have been leaked  online The  instruments are thought to be next-generation spy gadgets Vest can capture  a phone’s unique identifier number and track its location Memory stick can  steal network username and password By  Victoria Woollaston PUBLISHED: 05:59 EST, 2  September 2013 |  UPDATED: […]

Germany warns: You just CAN’T TRUST some Windows 8 PCs

  Microsoft: You can still buy an ‘insecure’ Win 8 machine sans TPM chip By       Jasper Hamill         23rd August 2013 10:38 GMT       Microsoft’s new touchy Windows 8 operating system is so vulnerable to prying hackers that Germany’s businesses and government should not use it, the country’s authorities […]

Hackers expected to unleash viruses on Windows XP in 2014 When support for the operating system stops, users will no longer receive updates to fix the exploits.

  By Leo Boon Yeow, Hardware Zone | 14-08-13   According to a report by Computerworld, hackers have been storing Windows XP zero-day vulnerabilities that they have discovered, with the intent of unleashing them on XP users the moment Microsoft ceases extended support for the aging operating system […]

Drawing the Line on Altering Human Minds

August 6, 2013, 2:14 pm <!– — Updated: 3:42 pm –> By NICK BILTON In my column this week, “Computer-Brain Interfaces Making Big Leaps,” I noted that a number of researchers and scientists were coming closer to technology usually reserved for science fiction: hacking our brains to remove […]

FBI pushes internet providers to install new spy system

© Flickr.com/dnewman8/cc-by The Federal Bureau of Investigation is pressuring internet providers to install software to intercept online metadata in real time. In its demands the agency appeals to the Patriot Act, which authorizes surveillance programs used by the US secret services.  According to CNET, an American tech media […]

Secret US drug agency unit passing surveillance information to authorities ( Special Operations Division, or SOD )

Wiretaps and telephone records are being funnelled across the country to launch criminal investigations of Americans  Reuters in Washington theguardian.com,              Monday 5 August 2013 10.38 EDT Federal agents are trained to ‘recreate’ the investigative trail to effectively cover up where the information originated. Photograph: Magdalena Rehova/Alamy A […]