surveillance

Pierluigi Paganini October 26, 2013
LinkedIn Intro iOS app intercept user’s emails in iPhone and much more

LinkedIn launched LinkedIn Intro app for iOS to show LI profiles right inside the native iPhone mail client. Which is the effect on privacy and security? LinkedIn, like any other social media platform is a mine of information for internet users, due this reason the number of attacks against it are soaring. The principal social […]

Pierluigi Paganini October 12, 2013
NSA FOXACID servers used to drive the hack into target systems

NSA leaked documents reveals the existence of FOXACID servers that provides an automated hacking platform used to drive operators into hacking targets. Security expert Bruce Schneier revealed in a recent post that the NSA has a wide-ranging arsenal of zero-day exploits to use for cyber operations, mainly used for cyber espionage campaigns. The effort spent by government for the […]

Pierluigi Paganini October 06, 2013
How NSA tries to compromise Tor anonymity. Tor Stinks document

Top-secret presentation Tor Stinks leaked by Snowden shows the techniques implemented by the NSA to overwhelm Tor Anonymity with manual analysis. Tor anonymity has been debated many times, according to majority security experts it was one of the most secure ways to stay online being far from prying eyes avoiding government surveillance. Recently a series of events have completely changed […]

Pierluigi Paganini October 01, 2013
Proxy.sh – Can you trust your VPN provider? Maybe …

Proxy.sh VPN service with no-logging policy announced to have sniffed the traffic of US based server to Catch Hackers. Can we trust the VPN service? Proxy.sh is considered one of most reliable VPN service with no-logging policy, its staff declares to provide any citizen all around the world the ability to protect their online privacy. Is is true? Are we sure […]

Pierluigi Paganini September 23, 2013
Chaos Computer Club claims to have defeated Apple TouchID

Chaos Computer Club claims to have bypassed the biometric security technology Apple TouchID by making a copy of a fingerprint photographed on a glass surface. Hackers members of the Chaos Computer Club claim to have defeated Apple TouchID fingerprint sensor for the iPhone 5S, just after the start of its sale to the public. The Chaos Computer Club in […]

Pierluigi Paganini September 19, 2013
NSA tried to insert backdoor into Linux

Linux Torvalds during last LinixCon admitted to have received pressure from US Intelligence to insert a backdoor into Linux. Linux Torvalds during a question-and-answer ‪session ‬at ‪the LinuxCon publicly admitted that the US Government requested him to insert a backdoor into Linux kernel. The circumstance must induce a reflection in all those experts that believe open […]

Pierluigi Paganini September 19, 2013
Goolge has access to WiFi passwords stored in Android mobile devices

Google might have the access to WiFi passwords of customers stored in Android mobile devices due a built-in feature in the Android OS. Google company might know every WiFi password in the world used by every single Android user, and extraordinary amount of sensitive data could be exposed. According a Michael Horowitz post published on […]

Pierluigi Paganini September 09, 2013
Surveillance – NSA can access data on your mobile device

The German news agency Der Spiegel reported last act of US surveillance, the NSA is able to access data stored in a wide range of mobile devices including Android, iPhone and BlackBerry. Here we are with weekly news on NSA surveillance activities, last week we were shocked by the news on Bullrun program meanwhile today we discuss on the capability of the agency to access data stored […]

Pierluigi Paganini September 07, 2013
NSA Bullrun program, encryption and false perception of security

Revelations on Bullrun program demonstrated that NSA has capabilities against widely-used online protocols such as HTTPS and encryption standards. The latest nightmare for US Administration is named Bullrun, another US program for massive surveillance. Snowden‘s revelations represented a heartquake for IT security, the image of NSA and US IT companies are seriously compromised such the trust of worldwide […]

Pierluigi Paganini September 03, 2013
Traffic Correlation Attacks against Anonymity on Tor

The researchers led by Aaron Johnson of the Naval Research Laboratory published the paper on Traffic Correlation Attacks against Anonymity on Tor. Anonymity on Tor network is the primary reason for the use of the popular network, hacktivists, whistleblowers, hackers, and cybercriminals are enticed by the possibility to be not traceable. Straying far from prying eyes is the primary attraction for the user of  Tor project. In reality […]