Cyber Security… Apple’s Biggest Hack Ever: 4000 Malicious iOS Store Apps Linked to CIA? 26 Sep 2015 The First major cyber attack on Apple's App Store has now been linked to CIA (Central Intelligence Agency). Last week, Researchers disclosed some 39 iOS apps on Apple's App Store…
Hactivism… Privacy group calls for a boycott of tech companies supporting CISA 26 Sep 2015 Privacy advocates are stepping up their lobbying efforts against the controversial cyber threat information sharing bill currently in Congress after several tech giants indicated their support. Activist group Fight for…
Privacy… Hotspot Shield Launches VPN Plugins For Chrome And Firefox 18 Sep 201522 Sep 2015 A free and unrestricted internet can be a dangerous place, but it’s always important for the tools that prevent government or corporate censorship of the web to stay one step ahead…
Dark Net… Mapping How Tor’s Anonymity Network Spread Around the World 18 Sep 201522 Sep 2015 ONLINE PRIVACY PROJECTS come and go. But as the anonymity software Tor approaches its tenth year online, it’s grown into a powerful, deeply-rooted privacy network overlaid across the internet. And…
Cyber Security… Implanted Cisco routers are coming after you and your insecurities 15 Sep 201522 Sep 2015 SECURITY COMPANY Mandiant has warned that the mythical router implant security attack is a real thing, and that it has seen at least 14 incidents in the wild. The SYNful…
Hacking… Hacking Team, Computer Vulnerabilities, and the NSA 15 Sep 201522 Sep 2015 When the National Security Administration (NSA) -- or any government agency -- discovers a vulnerability in a popular computer system, should it disclose it or not? The debate exists because…
Dark Net… Tor becomes extra secure as .onion becomes Special-Use Domain Name 15 Sep 201522 Sep 2015 Tor granted Special-use status by IETF, to become more secure and get security certificates. The dark web browser Tor has now become extra secure as the .onion url has now…
Cyber Security… Flawed TLS Implementations Leak RSA Keys 10 Sep 201515 Sep 2015 A number of TLS software implementations contain vulnerabilities that allow hackers with minimal computational expense to learn RSA keys. Florian Weimer, a researcher with Red Hat, last week published a…
Legal… California assembly passes digital privacy bill 10 Sep 201515 Sep 2015 The California state assembly has passed a digital privacy bill that aims to prevent government access without warrant to private electronic communications. The bill would provide some exceptions for law…
Attacks… Employees put business data at risk by installing gambling apps on their phones 6 Sep 20156 Sep 2015 If you work for a large, global company, chances are some of your peers have installed gambling apps on the mobile devices they use for work, and that's bad news…
Legal… Justice Department Cracks Down On The Use Of Cellphone Tracking Technology 4 Sep 20154 Sep 2015 Federal law enforcement officers will now be required to obtain a search warrant before using technology that tracks cellphone locations, according to a policy update issued by the Justice Department on Thursday.Under…
Open Source… How to create an I2P Darknet site 20 Apr 201523 Jun 2020 Originally the concept of an anonymous network, developed by the military, was to send and receive messages that were encrypted and hard to decipher. Nowadays this network, known as the darknet…