Category: NSA

  • IXmaps Map reveals if your Internet traffic is being monitored by the NSA

    A new interactive online tool named Internet Exchange Mapping (IXmaps) appeared earlier this week, and it shows if your data traffic passes through the NSA or not. Many prying eyes are out there, trying to discover everybody’s secrets and take a peek into everyone’s life. That’s why a team of faculty and students from the […]

  • WikiLeaks: CIA hacking tools infiltrate iPhones, MacBooks – Apple: It’s an old story

    WikiLeaks have been known to publish classified documents for a long time, and Thursday was no different the whistleblower organization revealed a new set of documents called “Dark Matter” from the “Vault 7” leak stating that the CIA has been infecting Apple products with a series of tools to spy on the US citizens. According […]

  • Notepad++ Issues Fix After CIA Attack Revealed in Vault7 Documents

    On 7th Match 2017, the whistle-blowing organization Wikileaks published a series of new documents code-named “Vault 7” allegedly belonging to the U.S. Central Intelligence Agency (CIA). These documents not only revealed the existence of a large-scale cyber espionage campaign but also show how the agency used zero days security flaws in Windows, macOS, Linux, iPhones, Android devices, several […]

  • Wikileaks Vault 7: CIA hacked Smart TVs, Phones, Trucks and Computers

    Wikileaks, the famed whistleblowing platform, recently revealed a lot to the public. Titled Vault 7, Part 1, the documents show a grim view of government surveillance as we know it. Among the disturbing pieces of information was that of the CIA’s efforts to breach the security of Apple’s iPads and iPhones. The Central Intelligence Service […]

  • To Spy or Not to Spy; Congress to Decide

    Dec 31st was the expiry date for section702 of the Foreign Intelligence Surveillance Act (FISA). Tech groups have been bandied together to remind Congress that the decision to extend the act should not be taken so lightly. And there should be an open debate rather than a rubber stamp to the provision which allows the […]

  • Email Encryption Service Provider ‘ProtonMail’ Now on Tor

    ProtonMail, launched in 2014 by a group of MIT and CERN experts, is the largest email encryption service provider in the world having more than two million users. It is the preferred emailing platform of activists and journalists who need to keep information confidential. In its latest announcement, ProtonMail’s co-founder Dr. Andy Yen stated that […]

  • Leaked info confirms in-house hacking capabilities of Israeli firm Cellebrite

    Most iPhone users assume a certain level of security regarding the data on their device. However, a recent report from ZDNet detailing the capabilities of well-known Israeli Digital Forensics Firm; Cellebrite; has revealed that this very well may not be the case. iPhone and iOS, security appears to be largely contingent upon the model of […]

  • Making in-flight cellphone calls? GCHQ, NSA have been listening

    NSA’s spying and surveillance capabilities are not hidden from anyone now especially when it comes to cell phone conversations made by unsuspecting local citizens. However, what comes as a great surprise is that NSA and the British Government Communication Headquarters (GCHQ) have been listening to in-flight cell phone conversations of passengers since 2005. This means, […]

  • Shadow Brokers Dump List of Servers Hacked by the NSA’s Equation Group

    ShadowBrokers Posted Links with Linux and Sun Solaris Servers’ Lists, originally hacked by NSA’s Equation Group – The list may also contain details on whether the NSA was spying on you or not. The battle between ShadowBrokers and Equation Group is getting heated ever since the latter scored points with its dumping of series of […]

  • One out of Two American Adults Part of the FBI’s Facial Recognition Database

    The Federal Bureau of Investigation (FBI) and other security agencies are keeping Facial Recognition records of 117 million Americans in the database. That’s about 50 percent of the population. Continued development of facial recognition databases is currently the first priority of the American intelligence and law enforcement agencies. The reason is that these databases can greatly […]

  • Why and how to delete your Yahoo email account permanently

    By now you may already know that Yahoo worked as a US government tool by allowing the National Security Agency (NSA) to scan the email accounts of millions of Yahoo users worldwide. You may also know that Yahoo suffered a massive data breach in which more than 5 million of its accounts were stolen, that […]

  • NSA Contractor Arrested for Stealing Classified Data

    A National Security Agency (NSA) contractor Harold Thomas Martin III was arrested by the Federal Bureau of Investigation back in August on charges of stealing confidential data of the intelligence organization. The 51-year-old NSA contractor hails from Glen Burnie, Maryland and has been accused of stealing, removal and retention of classified government materials. As per […]

  • Yahoo built a software to secretly scan user emails for the NSA

    Report: Yahoo, the Internet giant developed a software to secretly scan millions of its users’ email conversations for the NSA meanwhile Yahoo’s CEO provided full cooperation to the agency. Yahoo developed a software to secretly scan its users’ email conversation for the US Intelligence agencies. According to a report from Reuters: “The company complied with a […]

  • The Art of Hiding Cellphone, Laptop Cameras From Hackers and Government

    Security agencies can spy on you through your laptop and smartphone cameras — It’s time to cover them. With new and modern technology comes great responsibility for us as users to continue taking care and worrying about our privacy. Technology has done so much in our lives, connecting us to family, friends, and lost friends; […]

  • Oliver Stone’s Snowden Movie Trailer Released and it’s Awesome

    Oliver Stone’s masterpiece is coming — Here is the latest trailer for ‘Snowden,’ The Movie Oliver Stone is known for depicting famous real life stories on screen. And the list of his highly successful real-life depictions includes the Scarface, Kennedy assassination, the Watergate break-in, the Vietnam conflict, and the Bush administration’s ‘war on terror.’ The latest to […]

  • U.S government requested information on 5,200 accounts from Apple

    Being a tech giant is not easy — The government requesting data on users can be a headache as revealed in Apple’s latest report Apple has revealed the latest US law enforcement agency requests for user information that the government lodged during the second half of the 2015 year period. The government lodged 1,015 requests […]

  • Backdoor on Your Smartphone Already Exists — Explained

    Though the FBI has already hacked into the iPhone of suspected San Bernardino shooter Syed Rizwan Farook, there’s something missing — Mr. Kokumai, President of Mnemonic Security, Inc explains the reality of backdoor in our smartphones It appears that something crucial is overlooked in the heated debates about the backdoor on smartphones, which is the focus point of […]

  • Encrypted Email Startup Tutanota Reaches 1 Million Users

    Necessity is the mother of invention, the old adage has proved its worth again when a German-based company has successfully won the trust of privacy-conscious Internet users. The trend for using encrypted email service started after Snowden leaks. Several firms took on the NSA and came up with end-to-end email encryption system. Recently, a similar […]

  • Researchers Found Windows’ Malware Similar To The One Used by NSA

    NSA’s one of the known snooping tactics is installing a malware into hard drive’s firmware which makes the deletion of the malware nearly impossible even the malware can avoid formatting of the hard drive. Nemesis is a malware that can be used for similar purposes as it can avoid clean-up software and can even avoid […]