Intelligence

Pierluigi Paganini December 28, 2015
Darkweb, a look back at 2015 events and 2016 predictions

Which are the main events observed in the darkweb during the 2015 and what to expect in the next 12 months? The DarkWeb is a set of publicly accessible content that are hosted on websites whose IP address is hidden, but to which anyone can access it as long as it knows the address. The […]

Pierluigi Paganini December 27, 2015
InterApp, the device that can hack any Smartphone

The Tel Aviv-based Rayzone Group is offering for sale a gadget called InterApp that can intercept and exfiltrate information from nearby smartphones. InterApp is a device designed by the Israeli Rayzone Group that can spy on any smartphone. “InterApp system enables to get intimate information of any phone user, which is in the system’s ,proximity. The collected […]

Pierluigi Paganini December 25, 2015
Turkish officers are in contact with members of the ISIS

An investigation revealed that some Turkish officers on the Syrian border have communicated with terrorists of the ISIS in Syria. According to a report  published by the Turkey’s Cumhuriyet daily,  Turkish authorities are in communication with members of the dreaded members of the Islamic State. The report cites an investigation by the Ankara Chief Prosecutor’s […]

Pierluigi Paganini December 22, 2015
Who planted the Juniper ScreenOS Authentication Backdoor?

Who planted the Authentication Backdoor in the Juniper ScreenOS? Security experts are making their speculation, but interesting revelations are coming out. While the FBI is investigating the case searching for responsible for the introduction of a backdoor in a number of Juniper network devices, a number of speculation are circulating on the Internet.  Juniper Networks is a […]

Pierluigi Paganini December 22, 2015
Iranian hackers penetrated computers of a small dam in NY

Iranian hackers penetrated the industrial control system of a dam near New York City in 2013, raising concerns about the security of US critical infrastructure. It is official, Iranian hackers violated the online control system of a New York dam in 2013. According to reports, the hackers penetrated the control system of the dam and poked around […]

Pierluigi Paganini December 21, 2015
Chinese hackers target Taiwanese Opposition Party and media

Security experts at FireEye have uncovered a spear phishing campaign managed by Chinese hackers that is targeting Taiwan Opposition and Media ahead of the vote in January. According to FireEye a group of Chinese hackers is targeting Taiwan’s opposition party and journalists, security experts and officials. The attacks are occurring weeks away from a Taiwanese presidential […]

Pierluigi Paganini December 20, 2015
Hillary Clinton calls tech companies to create a Manhattan Project for Encryption

At tonight’s Democratic national debate Hillary Clinton Hillary Clinton calls tech companies to work on a new Manhattan Project for Encryption. At tonight’s Democratic national debate Hillary Clinton calls tech companies cooperate to create “a Manhattan-like project.” The US Government is expressing its concerns about the possible misuses of encryption that today represents a serious obstacle […]

Pierluigi Paganini December 20, 2015
FBI investigates on Juniper hack, is it a nation-state attack?

The FBI is investigating on the unauthorized code found in the operating system running on firewalls sold by Juniper Networks. The FBI confirmed that is investigating on the alleged breach of Juniper Networks VPN software that resulted in the introduction of unauthorized code in the OS running on Juniper firewalls. Juniper Networks makes communications equipment for enterprises […]

Pierluigi Paganini December 18, 2015
Unauthorized code found in Juniper’s firewall OS

An operating system running on firewalls sold by Juniper Networks contains unauthorized code that could be exploited to decrypt traffic sent through virtual private networks. An “unauthorized code” was discovered in the operating system for Juniper NetScreen firewalls. The company admitted the presence of the “unauthorized code” that could allow an attacker to decrypt VPN traffic. [“unauthorized code”] “could allow […]

Pierluigi Paganini December 18, 2015
A secret cellphone spying devices catalog leaked online

Someone in the Intelligence community leaked online a secret catalog of cellphone spying devices used by law enforcement. The Intercept has leaked online a secret catalog of cellphone spying devices, the precious document has been given to the online publication by someone inside the intelligence community. The person who passed the document to The Intercept […]