Edward Snowden

Pierluigi Paganini June 23, 2015
NSA and GCHQ target security firm including Kaspersky

Documents leaked by Edward Snowden show the NSA and the GCHQ efforts to compromise security software companies including Kaspersky Lab.  A new collection of documents leaked by the popular whistleblower Edward Snowden reveals that both UK and US government intelligence agencies are targeting principal security firms and security companies. Kaspersky Lab calls nation-states’ targeting of security companies […]

Pierluigi Paganini May 23, 2015
Astoria, the Tor client designed to beat the NSA surveillance

A team of security researchers announced to have developed Astoria, a new Tor client designed to beat the NSA and reduce the efficiency of timing attacks. Tor and Deep web are becoming terms even popular among Internet users, the use of anonymizing network is constantly increasing for this reason intelligence agencies are focusing their efforts in its monitoring. […]

Pierluigi Paganini May 16, 2015
Tails 1.4 is out to preserve your privacy and anonymity

The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user privacy and anonymity. The Debian-based distribution Tails, “The Amnesiac Incognito Live System,”version 1.4 is available online! Tails is a popular live operating system (that means that users can start it on almost any computer from removable […]

Pierluigi Paganini May 11, 2015
Skynet, the US top-secret program to track terrorists

Snowden revealed the existence of Skynet, a system designed by the NSA for online monitoring of terrorists and suspects through metadata analysis. Skynet is a real system designed by the NSA for online monitoring through metadata analysis, this is the last revelation made by the journalist Glenn Greenwald through the website The Intercept. The Intercept revealed the existence of a secret program called Skynet, […]

Pierluigi Paganini April 23, 2015
How to discover NSA Quantum Insert attacks on your systems

Security experts at Fox-IT have developed a method for detecting NSA Quantum Insert attacks and have published an interesting post on the hacking practice. Security researchers at Fox-IT have developed a method for detecting NSA hacking activity operated through the Quantum Insert-style hacks. The team of experts has published free open-source tools to detect duplicate […]

Pierluigi Paganini March 26, 2015
Slides reveal Canadian CSE secret hacking capabilities

The last collection of top-secret slides leaked by Snowden and disclosed by media agencies reveal the hacking capabilities and platforms of Canadian CSE. The last collection of top-secret documents leaked by the whistleblower Edward Snowden, and published by The Intercept  and the Canadian Broadcasting Corporation,  leaked documents reveal the Canadians are a dab hand at cyber-stuff, […]

Pierluigi Paganini March 08, 2015
Snowden reveals New Zealand surveillance Waihopai Base

A new collection of documents leaked by Edward Snowden shines light on shadowy New Zealand surveillance activities operated at the Waihopai Base. A new collection of documents leaked by Edward Snowden provides an interesting analysis of the relationship between the Five Eyes countries and the surveillance activities they managed. The documents published Saturday by the […]

Pierluigi Paganini February 26, 2015
SIM Maker Gemalto Confirms cyber attacks, but excludes key theft

SIM maker Gemalto confirmed that unknown hackers targeted its systems in the period indicated by Snowden, but denied any massive theft of encryption keys. Just a week ago, the media agencies spread the news that US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile […]

Pierluigi Paganini February 24, 2015
NSA Director Rogers urges the creation a legal framework for the US authorities

The NSA Director Rogers urges the creation of an independent legal framework to regulate the operations conducted US authorities. The NSA director and commander of U.S. Cyber Command, Admiral Michael Rogers, told a Washington cybersecurity forum that legislators need the creation of a legal framework to regulate the operations conducted by law enforcement and intelligence-gathering organizations worldwide. […]

Pierluigi Paganini February 20, 2015
Great SIM Heist – docs reveal mass cell phone hack by Five Eyes intelligence

US and British intelligence services have stolen encryption keys of the major SIM card maker Gemalto to spy on mobile voice and data communications worldwide. A new report published by The Intercept reveals that the National Security Agency and the British counterpart GCHQ obtained encryption keys of the global SIM manufacturer Gemalto, but the company […]