STEALING DATA FROM AIRGAPPED COMPUTERS BY USING POWER FLUCTUATIONS AS A COVERT CHANNEL

  via: BLN Ben Gurion university’s Mordechai Guri is a master exfiltrator, a computer scientist who’s devised a bewildering array of innovative techniques for getting data off of “airgapped” computers that have
read more

Massive ransomware attack hits 99 countries

  Source: CNN Tech | By Selena Larson  http://ht3.cdn.turner.com/money/big/technology/2017/03/30/mostly-human-hacker-down-vegas.cnnmoney_1024x576.mp4 Tens of thousands of ransomware attacks are targeting organizations around the world on Friday. Cybersecurity firm Avast said it has tracked more
read more

Dead End: Senate Intelligence Dems Admit There May Be ZERO Evidence Of Collusion Between Russians And Trump Campaign

  Source: Townhall | By Matt Vespa As Guy wrote last week, Sen. Chris Coons (D-DE) has retreated from his claim that there’s solid evidence of collusion between the Trump campaign and
read more

Malware expert says ‘fingerprint’ switch shows past attacks blamed on Russia, China are work of CIA

  Source: RT   Following revelations that the CIA can reportedly attribute its hacking activity to others, an anti-virus expert has said that attacks previously blamed on others are now
read more

John McAfee: “The Most Deceptive Propaganda To Date Was Perpetrated On The American Public”

  via: Zero Hedge |  By iBankCoin.com  Security expert and former Libertarian presidential candidate John McAfee went on RT yesterday to discuss the Grizzly Steppe Russian hacking report by Homeland Security. While not addressing the
read more

Cisco confirms NSA-linked zeroday targeted its firewalls for years

  Source: Ars Technica | By DAN GOODIN Company advisories further corroborate authenticity of mysterious Shadow Brokers leak. Cisco Systems has confirmed that recently-leaked malware tied to the National Security Agency exploited
read more

Thousands of Apps Secretly Run Ads That Users Can’t See

 Advertisers lose $895 million per year to invisible fraud within mobile apps Source: Bloomberg July 23, 2015 — 8:00 AM CDT by Joshua Brustein   The Apps World Multi-Platform Developer Show
read more

Hacked Hardware Could Cause The Next Big Security Breach

Source: Popular Science By P.W. Singer Posted February 17, 2015   Microchips govern our homes, cities, infrastructure, and military. What happens when they’re turned against us? In late summer of
read more

Why is Snowden in Russia? ‘Ask the State Department,’ he says

Source: RT Former National Security Agency contractor Edward Snowden told NBC News that although he would “like to go home” to the United States, his first priority is to see
read more

‘Complete disregard for moral integrity’: China lambasts US spying tactics

Source: RT China has labeled the US take on cyber-spying a “complete disregard for moral integrity” and has accused the country of taking advantage of its geopolitical hegemony to spy
read more

‘NSA, GCHQ criminals way ahead of the law in Britain and US’

Source: RT There are people trying to make money on the data leak scare, introducing new gadgets, but it doesn’t stop GCHQ or the NSA intercepting the data on its
read more

First contagious WiFi computer virus goes airborne, spreads like the common cold

Source: Daily Caller Computer science researchers have demonstrated for the first time how a digital virus can go airborne and spread via WiFi networks in populated areas at the same
read more

 
%d bloggers like this: