NSA approves Samsung’s Galaxy phones to handle classified US government data
Samsung Electronics Co. said Tuesday some of its Galaxy mobile devices were approved by the National Security Agency for use with classified U.S. government networks and data, a boost to the company’s efforts to expand in the security-conscious business market.
How Telecommunications Changed the Lives of Herders in Mongolia
Ulaan Uul, Mongolia – In the world’s least densely populated country, where three million people are spread over 1.5 million square kilometers, half of them clustered in the capital of Ulaanbaatar and one third still living a nomadic life, just think how hard it would be to send a message to a herder somewhere in [...]
New MasterCard combines a fingerprint sensor with NFC
For awhile now, there’s been a number of companies trying to simplify payments for everyone. Google did so with Wallet and, most recently, Apple announced it would be doing something similar with the soon-to-be-launched Apple Pay, among others. Not surprisingly, MasterCard’s, synonymous with paying for stuff, is working on a product of its own. In [...]
7 million Dropbox username/password pairs apparently leaked
Popular online locker service Dropbox appears to have been hacked. A series of posts have been made to Pastebin allegedly containing login credentials for hundreds of Dropbox accounts. The poster claims that 6,937,081 account credentials in total have been compromised.
The very first space detective agency: Satellite imagery experts launch new company to help settle legal disputes
The world’s very first space detective agency has been launched in a bid to settle disputes in court with the use of satellite images.
CORE SECRETS: NSA SABOTEURS IN CHINA AND GERMANY
The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by The Intercept.
Why Hong Kong Protesters are Using Firechat for Peer-to-Peer Communications on Their Mobiles
Protesters in Hong Kong are using WhatsApp, Twitter and any number of messaging and social media services to communicate and coordinate their activities as tensions with local Chinese authorities intensify. But one app in particular is getting more attention than usual: FireChat.
Top Tips: 5 Security Tips to Prevent Cyber Attacks
Following the recent spate of high-profile hacks at major companies such as Target and eBay, as well as the widespread panic inflicted by the Heartbleed Bug, many are wondering how to best secure against future attacks. A security breach not only negatively affects a company’s reputation but also consumer confidence and even its revenue. Oftentimes [...]
Mongolia’s ambitious eGovernment strategy
Mongolia’s digital goals are perhaps no less ambitious than those of its most famous son, Genghis Khan. He may have a reputation as a terrifying conqueror, but he also modernized Mongolian culture and played a role in forging early east-west trade.
Russian Gang Amasses Over a Billion Internet Passwords
A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password combinations and more than 500 million email addresses, security researchers say.
All sent and received e-mails in Gmail will be analyzed, says Google
Google added a paragraph to its terms of service as of Monday to tell customers that, yes, it does scan e-mail content for advertising and customized search results, among other reasons. The change comes as Google undergoes a lawsuit over its e-mail scanning, with the plaintiffs complaining that Google violated their privacy.
The Heartbleed Bug
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private [...]
NSA and GCHQ target ‘leaky’ phone apps like Angry Birds to scoop user data
The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of “leaky” smartphone apps, such as the wildly popular Angry Birds game, that transmit users’ private information across the internet, according to top secret documents.
Speech recognition hack turns Google Chrome into advanced bugging device
Users of Google’s Chrome browser are vulnerable to attacks that allow malicious websites to use a computer microphone to surreptitiously eavesdrop on private conversations for extended periods of time, an expert in speech recognition said.
South Koreans seethe, sue as credit card details swiped
The theft of personal information from more than 100 million South Korean credit cards and accounts, reportedly including those of President Park Geun-hye and UN chief Ban Ki-moon, has ignited a storm of anger and litigation against credit firms.
NSA collects millions of text messages daily in ‘untargeted’ global sweep
The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents.
Targeted Attacks Against the Energy Sector
The energy sector has become a major focus for targeted attacks and is now among the top five most targeted sectors worldwide. Companies in the sector are facing a growing risk of having their services interrupted or losing data. The threat to energy firms is only likely to increase in the coming years as new [...]
NSA Project DROPOUT JEEP Hacked Into Apple iPhones
The NSA targeted and hacked into Apple iPhones through their program called DROPOUT JEEP, according to security researcher Jacob Applebaum and Der Spiegel. NSA’s elite hacking unit, TAO, responsible for targeting corporate networks among other things, can even install malware and spyware on smartphones and other devices in the process of their being shipped to [...]
NSA reportedly planted spyware on electronics equipment
Based on internal NSA documents, Der Spiegel reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung.
Target hackers stole encrypted bank PINs
The hackers who attacked Target Corp (TGT.N) and compromised up to 40 million credit cards and debit cards also managed to steal encrypted personal identification numbers (PINs), according to a senior payments executive familiar with the situation.
World of Spycraft: NSA, GCHQ hacked WoW and Xbox Live, other games
Be careful how hard you troll in multiplayer games because the NSA, CIA, and FBI may be listening. According to a briefing paper from the National Security Agency published by The Guardian today, the NSA and its counterpart agency in the United Kingdom made efforts to monitor in-game communications in World of Warcraft, Xbox Live, [...]
Chinese hackers spied on Europeans before G20 meeting: researcher
Chinese hackers eavesdropped on the computers of five European foreign ministries before last September’s G20 Summit, which was dominated by the Syrian crisis, according to research by computer security firm FireEye Inc
NSA collects nearly five billion cellphone location records per day
Today, The Washington Post added another noteworthy finding to the growing pile of information leaked by former National Security Agency (NSA) contractor Edward Snowden: the NSA is collecting nearly five billion cellphone location records per day from across the world. The Post reports that this initiative allows the NSA to track individuals and map relationships [...]
NSA infected 50,000 computer networks with malicious software
The American intelligence service – NSA – infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this.