All sent and received e-mails in Gmail will be analyzed, says Google
Google added a paragraph to its terms of service as of Monday to tell customers that, yes, it does scan e-mail content for advertising and customized search results, among other reasons. The change comes as Google undergoes a lawsuit over its e-mail scanning, with the plaintiffs complaining that Google violated their privacy.
The Heartbleed Bug
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private [...]
NSA and GCHQ target ‘leaky’ phone apps like Angry Birds to scoop user data
The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of “leaky” smartphone apps, such as the wildly popular Angry Birds game, that transmit users’ private information across the internet, according to top secret documents.
Speech recognition hack turns Google Chrome into advanced bugging device
Users of Google’s Chrome browser are vulnerable to attacks that allow malicious websites to use a computer microphone to surreptitiously eavesdrop on private conversations for extended periods of time, an expert in speech recognition said.
South Koreans seethe, sue as credit card details swiped
The theft of personal information from more than 100 million South Korean credit cards and accounts, reportedly including those of President Park Geun-hye and UN chief Ban Ki-moon, has ignited a storm of anger and litigation against credit firms.
NSA collects millions of text messages daily in ‘untargeted’ global sweep
The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents.
Targeted Attacks Against the Energy Sector
The energy sector has become a major focus for targeted attacks and is now among the top five most targeted sectors worldwide. Companies in the sector are facing a growing risk of having their services interrupted or losing data. The threat to energy firms is only likely to increase in the coming years as new [...]
NSA Project DROPOUT JEEP Hacked Into Apple iPhones
The NSA targeted and hacked into Apple iPhones through their program called DROPOUT JEEP, according to security researcher Jacob Applebaum and Der Spiegel. NSA’s elite hacking unit, TAO, responsible for targeting corporate networks among other things, can even install malware and spyware on smartphones and other devices in the process of their being shipped to [...]
NSA reportedly planted spyware on electronics equipment
Based on internal NSA documents, Der Spiegel reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung.
Target hackers stole encrypted bank PINs
The hackers who attacked Target Corp (TGT.N) and compromised up to 40 million credit cards and debit cards also managed to steal encrypted personal identification numbers (PINs), according to a senior payments executive familiar with the situation.
World of Spycraft: NSA, GCHQ hacked WoW and Xbox Live, other games
Be careful how hard you troll in multiplayer games because the NSA, CIA, and FBI may be listening. According to a briefing paper from the National Security Agency published by The Guardian today, the NSA and its counterpart agency in the United Kingdom made efforts to monitor in-game communications in World of Warcraft, Xbox Live, [...]
Chinese hackers spied on Europeans before G20 meeting: researcher
Chinese hackers eavesdropped on the computers of five European foreign ministries before last September’s G20 Summit, which was dominated by the Syrian crisis, according to research by computer security firm FireEye Inc
NSA collects nearly five billion cellphone location records per day
Today, The Washington Post added another noteworthy finding to the growing pile of information leaked by former National Security Agency (NSA) contractor Edward Snowden: the NSA is collecting nearly five billion cellphone location records per day from across the world. The Post reports that this initiative allows the NSA to track individuals and map relationships [...]
NSA infected 50,000 computer networks with malicious software
The American intelligence service – NSA – infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this.
‘Royal Concierge’: GCHQ Monitors Diplomats’ Hotel Bookings
Britain’s GCHQ intelligence service monitors diplomats’ travels using a sophisticated automated system that tracks hotel bookings. Once a room has been identified, it opens the door to a variety of spying options.
NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say
The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials.
Fresh Leak on US Spying: NSA Accessed Mexican President’s Email
The NSA has been systematically eavesdropping on the Mexican government for years. It hacked into the president’s public email account and gained deep insight into policymaking and the political system. The news is likely to hurt ties between the US and Mexico.
Spies launch hack attacks on Mongolia… to see who its friends are
Cyber-spies are targeting Mongolian businesses and government agencies to keep the attackers “aware” of the land-locked country’s relationships with “Western influences” like the US and the European Union, according to a recent report.
Chaos Computer Club breaks Apple TouchID
The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple’s TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID. This demonstrates – again – [...]
US and UK spy agencies defeat privacy and security on the internet
US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden.
Cyber-spying fallout: Govt may restrict usage of Google’s Gmail for employees
BANGALORE/NEW DELHI: The government will soon ask all its employees to stop using Google’s Gmail for official communication, a move intended to increase security of confidential government information after revelations of widespread cyber-spying by the US.
Google Tells Court You Cannot Expect Privacy When Sending Messages to Gmail — People Who Care About Privacy Should Not Use Service, Consumer Watchdog Says
SANTA MONICA, CA — In a stunning admission contained in a brief filed recently in federal court, lawyers for Google said people should not expect privacy when they send messages to a Gmail account. Consumer Watchdog said today that people who care about their email correspondents’ privacy should not use the Internet giant’s service.
NetTraveler-т Монгол Улсын Батлан хамгаалах яам өртжээ
This report describes multiple cyber-espionage campaigns that have successfully compromised more than 350 high profile victims in 40 countries. The focus of the paper is to describe NetTraveler, which is the main tool used by the threat actors during these attacks.