The only good mobe is a dead mobe By Bill Ray Posted in Security, 14th June 2013 11:44 GMT Magic Quadrant for Enterprise Backup/Recovery US law enforcement is calling for a mandatory kill switch on all mobiles, enabling the shut… Read More ›
Cyber Security
All Hackable from fetal monitors used in hospitals to pacemakers implanted in people
FDA, facing cybersecurity threats, tightens medical-device standards By Lena H. Sun and Brady Dennis, Published: June 12 | Updated: Thursday, June 13, 6:01 AM The Food and Drug Administration is tightening standards for a wide range of medical devices — from fetal… Read More ›
Parents of SEAL killed in Afghanistan helicopter crash join billion-dollar lawsuit against the government after ‘their Verizon phone was tapped when they started asking questions over their son’s death’
Charles and Mary Anne Strange, from Philadelphia, said they heard strange tapping on the line in the months after son Michael’s death Mr Strange said: ‘When I started asking questions, that’s when my phone got tapped’ By Daily Mail Reporter… Read More ›
Europe warns US: Do what you like to Americans, but Do Not spy on Europeans
Wednesday, 12 June 2013 The EU has warned President Barack Obama’s administration of “grave adverse consequences” to the rights of European citizens from a huge US Internet surveillance programme, officials said Wednesday. Viviane Reding, the EU’s Justice Commissioner, wrote… Read More ›
Americans start operation “Troll the NSA”
Tuesday, 11 June 2013 An operation to troll the NSA has started up online in a bid to jam the spy scanners. The plan is to ‘test’ the system by sending a message full of terrorist buzz words to… Read More ›
Hacker who helped find Steubenville rapists threatened with decade in prison
While the rapists get minimum sentence and rehab By Iain Thomson in San Francisco Posted in Security, 10th June 2013 18:13 GMT Free whitepaper – Customer Success Testimonial: Recovery is Everything A security consultant who helped uncover evidence of the… Read More ›
The spy who came in for your soul – ” We are, like, that far from a turnkey totalitarian state.”
COLUMN – The spy who came in for your soul Source: Reuters – Sun, 9 Jun 2013 08:00 PM Author: Reuters (Jack Shafer is a Reuters columnist but his opinions are his own.) By Jack Shafer June 9 (Reuters) –… Read More ›
William Hague: Law-abiding Britons have nothing to fear from GCHQ
The Foreign Secretary will appear before the House of Commons tomorrow to try to allay concerns about the Prism spy scheme which enables the USA’s spy agency to mine data from Facebook and other web companies Andy McSmith Sunday, 9… Read More ›
NSA sucks realtime data from FIFTY companies
Companies are all compelled by the Foreign Intelligence Surveillance Act to hand over any information requested under the law, but they’re not required to make access easier PRISM data-mining program was launched in 2007 with approval from special federal judges… Read More ›
Boundless Informant: the NSA’s secret tool to track global surveillance data
Revealed: The NSA’s powerful tool for cataloguing data – including figures on US collection • Boundless Informant: mission outlined in four slides • Read the NSA’s frequently asked questions document Glenn Greenwald and Ewen MacAskill guardian.co.uk, Saturday 8… Read More ›
Spy program shows just how well US knows its people
17:35 07 June 2013 by Hal Hodson For similar stories, visit the Crime and Forensics Topic Guide They’re watching you (Image: Lucas Jackson/Reuters) The US government is watching every digital move that Americans make. More than 115 million people… Read More ›
Link to Anonymous Leaked PRISM-related NSA docs
EEV: Always Click with Caution Link to Anonymous leaks more PRISM-related NSA docs Primary Page: http://thedocs.hostzi.com/ 2010 EA Conf_RA Track Presentation_20100506.ppt 3170_01.pdf 514401Doddirectoritenetworks.pdf 6212_01.pdf 800001pDirectoriteDodinfoenterprise.pdf DT-12-COI-Glossary.pdf DoDAF-DM2_CMP_v1-0_FINAL_2011-10-03r1.docx DoD_NetOps_Strategic_Vision.pdf EATransitionStrategy.pdf NSI_EE.pdf insa-spies.pdf netcentric_jfc-1.pdf security_clearance.pdf
Foreign Governments gathering secret intelligence via covert NSA operation
UK gathering secret intelligence via covert NSA operation Exclusive: UK security agency GCHQ gaining information from world’s biggest internet firms through US-run Prism programme Nick Hopkins guardian.co.uk, Friday 7 June 2013 09.27 EDT Documents show GCHQ (above) has… Read More ›
Leak of NSA order against Verizon could cause irreversible harm to national security, says top intelligence officer
A copy of a secret order shows that the National Security Agency ordered Verizon to hand over millions of phone records with no explanation Order extends from until July 19 and includes domestic and foreign calls Nearly 150million Verizon customers… Read More ›
By the numbers: The NSA’s super-secret spy program, PRISM
Posted By Elias Groll Thursday, June 6, 2013 – 8:00 PM In a bombshell scoop, the Washington Post is reporting that the National Security Agency (NSA) has gained direct access to the servers of nine prominent Internet companies,… Read More ›
Forget phones, PRISM plan shows internet firms give NSA everything
Microsoft, Google, Apple and Yahoo! and others open their legs servers By Iain Thomson in San Francisco Posted in Security, 7th June 2013 00:23 GMT It has been a rough 24 hours for the US National Security Agency. First a leaked… Read More ›
NSA collecting phone records of millions of Americans daily – revealed
Exclusive: Top secret court order requiring Verizon to hand over all call data shows scale of domestic surveillance under Obama • Read the court order in full here Glenn Greenwald The Guardian, Wednesday 5 June 2013 Under the terms of the… Read More ›
Obama’s top appointees use secret email accounts – AP
Published time: June 04, 2013 16:04 Reuters / Kacper Pempel / Files Human rights, Internet, Obama, Scandal, Security, USA Some of US President Barack Obama’s high-ranked political appointees are using secret government email accounts, which they say… Read More ›
Germany: Microsoft’s Xbox is twisted nightmare for spying
Monday, 03 June 2013 When Microsoft launched its new Xbox One console last week, rave reviews calling it “awesome” and “stunning” were quickly forgotten when gamers began complaining about how the device doesn’t work with their old favorites (among… Read More ›
Motorola shows off tattoo and swallowable password hardware
Mobe manufacturer playing long game for end times By Iain Thomson in San Francisco Posted in Security, 31st May 2013 19:26 GMT Regcast training : Hyper-V 3.0, VM high availability and disaster recovery Motorola has shown off an electronic authentication… Read More ›
Google MUST hand over sensitive details for thousands of users to FBI – even without a warrant
By Daily Mail Reporter and Associated Press PUBLISHED: 09:06 EST, 1 June 2013 | UPDATED: 09:06 EST, 1 June 2013 Google must comply with the FBI’s warrantless demands for large amounts of customer data, a federal judge has ruled…. Read More ›
Guccifer emails link Tony Blair to top-secret Bohemian Grove gathering
Published time: March 25, 2013 17:28 Edited time: March 28, 2013 07:41 Former British prime minister Tony Blair (AFP Photo / Carl Court) Attending the elusive Bohemian Grove retreat should be a priority for former UK Prime Minister Tony… Read More ›
US National Intelligence Council boss gets personal email hacked
Guccifer claims another political scalp with anti-Obama rant By Iain Thomson in San Francisco Posted in Security, 29th May 2013 20:14 GMT In a rather embarrassing slip, the personal email account of Christopher Kojm, chairman of the US National Intelligence… Read More ›
Report: Chinese Hackers Breach Top Weapons Designs
May. 28, 2013 – 05:59PM | By DOUG STANGLIN USA Today and the Defense News staff | Cyber Attack Targets Australia Spy Headquarters: Hackers traced to a server in China have stolen the floor plans for the new Australia… Read More ›
Gang stole $45m from cash machines across globe in hours, say prosecutors
‘Virtual criminal flash mob’ used bogus swipe cards loaded with data from hacked bank databases to commit thousands of thefts Associated Press in New York guardian.co.uk, Friday 10 May 2013 05.38 EDT Seven people are being held in connection with… Read More ›
Are all telephone calls recorded and accessible to the US government?
A former FBI counterterrorism agent claims on CNN that this is the case Glenn Greenwald guardian.co.uk, Saturday 4 May 2013 08.22 EDT Former FBI counterterrorism agent Tim Clemente, on CNN, discussing government’s surveillance capabilities Photograph: CNN screegrab The real capabilities… Read More ›
‘Chinese’ attack sucks secrets from US defence contractor
Comment Crew blamed for three-year attack on QinetiQ By Phil Muncaster Posted in Security, 2nd May 2013 04:54 GMT Free whitepaper – Hands on with Hyper-V 3.0 and virtual machine movement Just when it looked like US-China relations couldn’t get… Read More ›
Red faces as Pentagon leases Chinese satellite
It’s ok, we’ve added ‘additional transmission security’ By Phil Muncaster Posted in Government, 1st May 2013 04:04 GMT Free whitepaper – Hands on with Hyper-V 3.0 and virtual machine movement US lawmakers are up in arms after it emerged that the… Read More ›
Pentagon leaning on Chinese satellite for Africa Command communications : ” sparked outcry by disclosing its lease of bandwidth from a Chinese satellite “
On the heels of a new presidential resolution for US government agencies to avoid Chinese IT hardware over security concerns, the Pentagon has sparked outcry by disclosing its lease of bandwidth from a Chinese satellite. According to Pentagon… Read More ›
Smart Meters Easily Hacked and can shut down whole neighbourhoods
Crap computers in a crap box: Smart-meter blackouts risk to UK Sniff a device’s wireless, pwn a power plant, warns Brit biz By John Leyden Posted in Security, 30th April 2013 09:06 GMT Free whitepaper – Hands on with Hyper-V… Read More ›
Serial killer hack threat to gas pipes, traffic lights, power plants
‘You could shut down the electricity grid’ warns security biz By John Leyden Posted in Security, 29th April 2013 09:04 GMT Free whitepaper – Hands on with Hyper-V 3.0 and virtual machine movement Analysis Medical systems to traffic light boxes are… Read More ›
Your phone may not be spying on you now – BUT it soon will be
Smash it with a hammer now, it’s the only way to be sure By John Leyden Posted in Security, 24th April 2013 10:04 GMT Free whitepaper – Hands on with Hyper-V 3.0 and virtual machine movement Infosec 2013 Tibetan political… Read More ›
Hacked AP tweet claiming White House explosion causes Dow dip
Pro-Assad Syrian Electronic Army claims responsibility By Iain Thomson in San Francisco Posted in Security, 23rd April 2013 19:27 GMT Free whitepaper – Hands on with Hyper-V 3.0 and virtual machine movement A group calling itself the Syrian Electronic Army… Read More ›
Massive Brute-force attack Targets WordPress sites worldwide
A large distributed brute force attack against WordPress sites is understood to be occurring. A large botnet with more than 90,000 servers is attempting to log in by cycling through different usernames and passwords. According to a blog update on IXWebHosting,… Read More ›
Researcher hacks aircraft controls with Android smartphone
This may give the TSA some ideas By Iain Thomson in San Francisco Posted in Security, 11th April 2013 01:12 GMT Free whitepaper – EMA advanced performance analytics report A presentation at the Hack In The Box security summit in… Read More ›
So that’s what Assange has been doing inside the embassy! WikiLeaks releases 1.7m US diplomatic and intelligence reports covering every country in the world
Wikileaks releases database of U.S. diplomatic records from 1973 to 1976 Henry Kissinger was U.S. Secretary of State and National Security Adviser Julian Assange worked on project inside Ecuadorian Embassy in London Australian Wikileaks founder, 41, sought refuge at the… Read More ›
North Korea readies missile launch as fears of a covert cyberwar grow
As Pyongyang moves ballistic weapons to the coast, it may also be planning to disable computer networks in the US Justin McCurry in Seoul The Observer, Saturday 6 April 2013 17.18 EDT A South Korean soldier patrols at the crossing… Read More ›
North Korea ready for cyberwar
Posted By Josh Peterson On 1:10 PM 04/05/2013 In Tech Despite the popular impression that North Korea is technologically inept, the regime boasts a significant and effective cyber arsenal, in addition to what is currently known about its nuclear arsenal…. Read More ›
New Secret Service chief ‘hacked and personal information published online’ days after appointed
A Social Security number, phone numbers and a credit report are among those claimed to belong to Julia Pierson on site Secret Service investigating with accuracy of private data unclear By Daily Mail Reporter PUBLISHED: 16:57 EST, 4 April 2013… Read More ›
Hacking group Anonymous_Korea takes down N.Korea’s official websites
© Collage “The Voice of Russia” Hacking group Anonymous_Korea claimed they have taken down five of North Korea’s official websites, including the country’s official web portal and the foreign relations committee’s site. The hacktivist group Anonymous_Korea published a list of… Read More ›
Biological computer that ‘lives’ inside the body comes one step closer as scientists make transistor out of DNA and RNA
Finding could lead to new biodegradable devices based on living cells that are capable of detecting changes in the environment Steve Connor Thursday, 28 March 2013 Scientists believe they are close to building the first truly biological computer made from… Read More ›
‘Biggest cyber-attack in history’ slows down global internet after quarrel between web-hosting company and anti-spam group
Internet services across the world have been disrupted and widespread congestion risks jamming crucial online infrastructure say experts Rob Williams Wednesday, 27 March 2013 A row between an anti-spam group and a web-hosting company has caused a slowdown in the… Read More ›
Guccifer emails link Tony Blair to top-secret Bohemian Grove gathering
Published time: March 25, 2013 17:28 Former British prime minister Tony Blair (AFP Photo / Carl Court) Attending the elusive Bohemian Grove retreat should be a priority for former UK Prime Minister Tony Blair, News Corp executive Andrew Knight… Read More ›
Guccifer releases second trove of Clinton emails
Published time: March 22, 2013 18:17 Hillary Clinton.(AFP Photo / Mandel Ngan) The hacker that has targeted Hillary Clinton and the Presidents Bush has leaked a new trove of classified emails to RT that discuss in detail the Algerian… Read More ›
CIA recording every Facebook Msg, Tweet…
Thursday, 21 March 2013 Just days after the CIA inked a $600-million cloud computing contract with Amazon, chief technology officer Gus Hunt admitted that the agency is trying to amass as much data as it can,… Read More ›
South Korea Cyber Attack was launched from a Chinese IP Address
South Korea Cyber Attack, Wiper malware and Chinese IP Address Posted by: Mohit Kumar onThursday, March 21, 2013 Yesterday we reported about a massive Cyber attack on South Korea that was responsible for shutting down networks of South Korean banks and… Read More ›
South Korea on alert for cyber-attacks after major network goes down
Computer systems of banks and broadcasters are interrupted, with fingers immediately pointed at North Korea Tania Branigan in Beijing ◦guardian.co.uk, Wednesday 20 March 2013 06.00 EDT South Korea is investigating a suspected cyber-attack that paralysed systems at major media and… Read More ›
Hackers publish CIA Director Brennan’s financial records
EEV: Remember ALL information needs to be validated. Further linking will lead to a Trans Union Credit Report in html. Trolling is not uncommon in these circumstances. Links however, do appear to be accurate. If legitimate, we have a serious lack… Read More ›
Chinese hackers infiltrate Indian Defence Research Organisation
Posted by: Mohit Kumar onWednesday, March 13, 2013 According to an exclusive report published today by DNA news, the computers of highly sensitive Defence Research and Development Organisation (DRDO) have reportedly been hacked by Chinese hackers as biggest security breach in… Read More ›
US national vulnerability database hacked
Malware infection forces government vuln catalog offline By Jack Clark in San Francisco Posted in Security, 14th March 2013 01:17 GMT The US government’s online catalog of cyber-vulnerabilities has been taken offline – ironically, due to a software vulnerability. The… Read More ›