US Government Bans Kaspersky Lab
Sep15

US Government Bans Kaspersky Lab

Russian Intelligence and Kaspersky Acting Secretary of Homeland Security Elaine Duke issued a BOD in order to identify and remove any Kaspersky Lab products and related entities. This comes after accusations of Kaspersky Lab handing out data to Russian intelligence. US governments are avoiding any relations with the Russian intelligence after the state sponsored attack which was carried out earlier. Are they? All fronts? But this...

Read More
Chinese Man Jailed For Selling VPN
Sep05

Chinese Man Jailed For Selling VPN

Bypassing The Great Firewall of China A Chinese man has been jailed “on suspicion of providing tools for illegal control of a computer information system.”. The illegal control of a computer, in this case, is VPN software. “The court held that the defendant Deng Jiewei disregarded state law, by providing tools specifically for the invasion and illegal control of computer information systems procedures,” the Guandong Province’s...

Read More
CIA Tool Captures Still Images From Live Video Stream
Aug11

CIA Tool Captures Still Images From Live Video Stream

CouchPotato WikiLeaks has exposed CIA tool which captures images from live video streams remotely. While there are no specific documentations how CIA are able to hack the machine remotely, it could be assumed that the tool is used with other malware by CIA. Not only the tool can capture images but also save the video as AVI. It also has the ability to capture with and without the audio. “Today, August 10th 2017, WikiLeaks...

Read More
US Government To Launch A Cyber Attack Against Russian Government
Oct17

US Government To Launch A Cyber Attack Against Russian Government

“we’re sending a message” to Putin The U.S. Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations. The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed...

Read More
Apple May Log All Your Contacts
Oct11

Apple May Log All Your Contacts

End to End Encryption Isn’t So Secure After All When company chooses to log information which isn’t necessary and breach privacy acts, end to end encryption is no use. Apple promises that your iMessage’s are secure and safe. Unfortunately this is not the case. Documents obtained by The Intercept, show’s that Apple logs your IP addresses and contacts stored on your phone even though no communication were carried...

Read More
%d bloggers like this: