A security researcher claimed to have rooted the super secure Smartphone Blackphone in just five minutes. Is it true? What’s happened? Recently we read about the Blackphone, a super secure smartphone designed by SGP Technologies, a joint venture between Silent Circle and Spanish Geekphone, which is able to avoid surveillance of the NSA. The designer of Blackphone […]
China has excluded Symantec Corp and Kaspersky Lab from a list of approved antivirus software suppliers to limit the use of foreign technology. Cyber espionage is the first concern of government, China and US exchanged in the months reciprocal accusations on a series of hacking campaign conducted with the purpose of stealing sensitive information. According to the People’s Daily […]
A researchers at the Exodus Intelligence firm has discovered a series of zero day vulnerabilities in the popular Tails Linux-based distribution. A researcher at Exodus Intelligence has discovered critical zero-day vulnerabilities in the popular Tails live operating system. Tails is considered by security experts an indispensable tool to preserve the privacy and security of users that intend to […]
Edward Snowden leaked a top-secret GCHQ document which details the operations and the techniques used by JTRIG unit for propaganda and internet deception. The JTRIGÂ unit of the British GCHQ intelligence agency has designed a collection of applications that were used to manipulate for internet deception and surveillance, including the modification of the results of the […]
The German broadcaster ARD published a report that reveals that NSA XKeyscore has targeted two Germany-based Tor Directory Authority servers. The NSA surveillance program XKeyscore, according to a report published by German public broadcaster ARD, two Germany-based Tor Directory Authority servers have been targeted by the US intelligence. According to the report, the two cases are not isolated, in the past […]
A letter revealed that all the US Intelligence agencies have queried the Section 702 communications content for US persons in 2013. The Snowden case has caused an earthquake in the US intelligence, it is changing the way the principal US agencies are informing citizens of the some of the operation their ordinary conduct to ensure […]
Kaspersky Lab and Citizen Lab have released the results of their analysis on the global C2 infrastructure used by the Italian firm HackingTeam. Security experts from Kaspersky Lab and Citizen Lab at the Munk School of Global Affairs at the University of Toronto have released the results of their analysis on the  global command and control […]
The last collection of documents leaked by Snowden reveals the existence of the  RAMPART-A program which allows NSA to tap into fiber optic cables worldwide Snowden’s leaked documents have revealed the complex spying machine used by NSA to implement its surveillance program. The last collection of secret files, published on Wednesday by journalists at The Intercept and […]
Vodafone has recently issued the Law Enforcement Disclosure Report to reveal the existence of secret wires that allow state surveillance. Vodafone, one of the largest mobile carrier of the world has issued a document, titled “Law Enforcement Disclosure Report“, which describes the collaboration provided by the company to many governments for lawful interception for some of its 400 […]
A last revelation on the surveillance activities of British intelligence GCHQ confirms the existence of spy base tapping undersea cables in the Middle East. In the last year Edward Snowden has leaked many disconcerting documents for the surveillance activity conducted by the NSA and GCHQ intelligence agencies, the last revelation is related Britain covert spying programme, in particular the information on clandestine British base […]