US Congress members urged to embrace encrypted apps
Congress members and staff are being urged by a civil rights group to use encrypted smartphone apps such as WhatsApp and Signal rather than traditional cellular networks.
China’s secret gold hoarding strategy
China’s recent stock market gyrations have some analysts now calling China the biggest bubble in history. But those who write off China because of market volatility are missing a more important long-term trend of Chinese geopolitical and monetary ascendancy. That trend shows no signs of abating.
Pakistan to shut down BlackBerry services on “security” grounds
Pakistani authorities are planning to shut down BlackBerry’s secure messaging services in the country towards the end of the year, citing national security reasons.
Security Analysis of Android Factory Resets
With hundreds of millions of devices expected to be traded by 20181 , flaws in smartphone sanitisation functions could be a serious problem. Trade press reports2 have already raised doubts about the effectiveness of Android “Factory Reset”, but this paper presents the first comprehensive study of the issue.
How the U.S. thinks Russians hacked the White House
Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.
Треть пользователей Android были взломаны в 2014 г.
Аккаунты 34 % пользователей устройств на ОС Android подверглись взлому в 2014 году. Такую неутешительную статистику приводит «Лаборатория Касперского» и аналитическое агентство B2B International.
Russian researchers expose breakthrough U.S. spying program
The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives.
Bank Hackers Steal Millions via Malware
In late 2013, an A.T.M. in Kiev started dispensing cash at seemingly random times of day. No one had put in a card or touched a button. Cameras showed that the piles of money had been swept up by customers who appeared lucky to be there at the right moment.
NSA secretly hijacked existing malware to spy on N. Korea, others
A new wave of documents from Edward Snowden’s cache of National Security Agency data published by Der Spiegel demonstrates how the agency has used its network exploitation capabilities both to defend military networks from attack and to co-opt other organizations’ hacks for intelligence collection and other purposes. In one case, the NSA secretly tapped into [...]
Surprise! North Korea’s official news site delivers malware, too
A security researcher examining the website of North Korea’s official news service, the Korean Central News Agency, has discovered that the site delivers more than just the latest photo spread of Democratic Peoples’ Republic of Korea leader Kim Jong Un inspecting mushroom farms. There’s a little extra surprise hidden in the site’s code—malware. The news [...]
Apparent Islamic State backers hack U.S. military Twitter feed
The Twitter and YouTube accounts for the U.S. military command that oversees operations in the Middle East were hacked on Monday by people claiming to be sympathetic toward the Islamic State militant group being targeted in American bombing raids.
‘Hacktivist’ group Anonymous says it will avenge Charlie Hebdo attacks by shutting down jihadist websites
Hacker group Anonymous have released a video and a statement via Twitter condemning the attacks on Charlie Hebdo, in which 12 people, including eight journalists, were murdered.
Sony employees resort to BlackBerry phones after hacker comms shutdown
Communications are critical and when Sony was shut down by cyber attacks they ended up finding help in an archived collection of BlackBerry phones.
Kaspersky Security Bulletin 2014. Predictions 2015
In 2015, we expect to see another stage in the evolution of cyber-criminal activity with the adoption of APT tactics and techniques in financially motivated online criminal activity.
Cyber-espionage expected to surge in 2015: McAfee Labs
Cyber-espionage and attacks on connected devices are expected to surge in 2015, according to McAfee Labs’ annual threats predictions report for the coming new year.
New bill aims to curb US government backdoor spying
While the FBI thinks that all communication tools in the US should have backdoors for law enforcement, a new Senate bill has proposed the exact opposite. The Secure Data Act, introduced by Senator Ron Wyden, would prohibit the government from forcing companies like Google and Apple to grant access to encrypted data. A different bill [...]
DeathRing, a new Pre-loaded mobile trojan in the wild
The number of Pre-loaded mobile trojan in the wild is increasing, DeathRing is the last one discovered by the experts at Lookout firm.
The NSA spent years snooping on the world’s wireless carriers
The NSA’s got its long, spindly proboscises slurping up sweet, sweet information from within governments and businesses the world over, so it shouldn’t come as a surprise to hear that wireless carriers are targets, too. That’s the thrust of a lengthy new report from The Intercept: The NSA is capable of snooping in on a [...]
Predicting crimes BEFORE they happen: Berlin police adopt Minority Report-style software that seeks out criminal behaviour
When police officers in Minority Report predicted who would commit crimes, and stopped them before they happened, it was considered so futuristic the film was set in 2054.
German government says “ja” to BlackBerry’s acquisition of Secusmart
The German government has signed off BlackBerry’s acquisition of the German company Secusmart, according to local media (Google Translate).
Regin, new computer spying bug, discovered by Symantec
A leading computer security company says it has discovered one of the most sophisticated pieces of malicious software ever seen.
New Mongolian Prime Minister Approved With Vow to Revive Growth
Mongolia’s parliament approved a new prime minister today, weeks after ousting his predecessor over plunging foreign investment and slower growth in the resource-rich nation.
Facebook sets up ‘dark web’ link to access network via Tor
Facebook has created the ability for users to connect directly to the social network via anonymising “dark web” service Tor.
NSA approves Samsung’s Galaxy phones to handle classified US government data
Samsung Electronics Co. said Tuesday some of its Galaxy mobile devices were approved by the National Security Agency for use with classified U.S. government networks and data, a boost to the company’s efforts to expand in the security-conscious business market.
How Telecommunications Changed the Lives of Herders in Mongolia
Ulaan Uul, Mongolia – In the world’s least densely populated country, where three million people are spread over 1.5 million square kilometers, half of them clustered in the capital of Ulaanbaatar and one third still living a nomadic life, just think how hard it would be to send a message to a herder somewhere in [...]
New MasterCard combines a fingerprint sensor with NFC
For awhile now, there’s been a number of companies trying to simplify payments for everyone. Google did so with Wallet and, most recently, Apple announced it would be doing something similar with the soon-to-be-launched Apple Pay, among others. Not surprisingly, MasterCard’s, synonymous with paying for stuff, is working on a product of its own. In [...]
7 million Dropbox username/password pairs apparently leaked
Popular online locker service Dropbox appears to have been hacked. A series of posts have been made to Pastebin allegedly containing login credentials for hundreds of Dropbox accounts. The poster claims that 6,937,081 account credentials in total have been compromised.