No-one wants to buy the Shadow Brokers’ stolen NSA tools
The Shadow Brokers – the hacker group who claimed to have stolen a large cache of National Security Agency (NSA) hacking tools – is disappointed to find that it’s theRead More →
The Shadow Brokers – the hacker group who claimed to have stolen a large cache of National Security Agency (NSA) hacking tools – is disappointed to find that it’s theRead More →
With only a small amount of work, ExtraBacon will commandeer new versions of ASA. Recently released code that exploits Cisco System firewalls and has been linked to the National Security AgencyRead More →
Exploit against Cisco’s PIX line of firewalls remotely extracted crypto keys. In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customersRead More →
The National Security Agency (NSA) has reportedly turned its focus on Tor and Linux users, having recently shown a keen interest in these users’ online activities. The NSA has goneRead More →
THE NATIONAL SECURITY AGENCY is researching opportunities to collect foreign intelligence — including the possibility of exploiting internet-connected biomedical devices like pacemakers, according to a senior official. “We’re looking atRead More →
When the FBI was trying to break into the San Bernardino shooter’s iPhone, many assumed that the NSA would have the technical capability to do so. Turns out, one ofRead More →
A study conducted by the NSA confirms that telephone metadata from phone logs reveals individuals’ Personal Information to government surveillance agencies. It has been argued in the past that theRead More →
RECENT HEADLINES WARN that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 areRead More →
Ransomware has become the scourge of the web in recent months. Hospitals thrust back into the non-digital age, their files locked up until they paid hefty ransoms in Bitcoin. SchoolsRead More →
ShortBytes: In a recent find out, it has been revealed how NSA implants trojan firmware in the networking devices being delivered to the targeted customers. You can also read anRead More →