 Your new post is loading...
 Your new post is loading...
|
Scooped by
Gust MEES
February 17, 2015 5:10 AM
|
|
Scooped by
Gust MEES
February 17, 2015 3:57 AM
|
|
Scooped by
Gust MEES
April 12, 2014 9:16 AM
|
The NSA denied a report claiming it was aware of and even exploited the "Heartbleed" online security flaw to gather critical intelligence.
Learn more:
|
Scooped by
Gust MEES
April 11, 2014 3:52 PM
|
The U.S. National Security Agency knew for at least two years about a flaw in the way that many websites send sensitive information, now dubbed the Heartbleed bug, and regularly used it to gather critical intelligence, two people familiar with the matter said.
The NSA’s decision to keep the bug secret in pursuit of national security interests threatens to renew the rancorous debate over the role of the government’s top computer experts.
Learn more:
|
Scooped by
Gust MEES
April 2, 2014 2:32 PM
|
In a letter to Congress released on Tuesday, the US government confirmed what we all knew (or at least suspected) – the National Security Agency has conducted warrantless searches on Americans' pri...
|
Scooped by
Gust MEES
March 14, 2014 9:11 AM
|
Former CIA contractor Edward Snowden has alleged that NSAs surveillance is even more widespread than first thought.
The latest documents released by Snowden, first published on Glenn Greenwald's new Interceptwebsite, suggest that the NSA's approach to monitoring targets' computers using eavesdropping malware has been on a near industrial scale, rather than carefully targeted.
Amongst the many tools used to carry out the targeted attacks - via compromised routers or Facebook - is an automated infection application known as ‘TURBINE' that can scale to millions of infection attempts a day.
|
Scooped by
Gust MEES
March 13, 2014 1:05 PM
|
Spy tools, whether designed by intelligence agencies, cyber crooks or internet creeps, can turn your camera on without illuminating the indicator light. Online tutorials even instruct neophyte hackers on how to hijack your webcam. Fortunately, WIRED is here with a solution.
|
Scooped by
Gust MEES
March 13, 2014 9:03 AM
|
The National Security Agency reportedly has plans to control millions of computers by infecting them with malware, according to documents leaked to The Intercept by NSA whistleblower Edward Snowden.
|
Scooped by
Gust MEES
February 27, 2014 11:19 AM
|
The U.K. and U.S. government's ability to tap into webcams — and directly into your living rooms and offices — shows the biggest and most blatant lack of respect for people's privacy by Western governments in living memory.
|
Scooped by
Gust MEES
February 13, 2014 12:20 PM
|
Logic suggests that the NSA is developing its own cyber weapons. It has its own malware, and its own CC servers says Sarb Sembhi, Incoming Thought Analyst.
|
Scooped by
Gust MEES
January 30, 2014 12:08 PM
|
The U.S. National Security Agency specifically looks for data sent by mobile apps in order to capture personal data on targets, according to a new...
|
Scooped by
Gust MEES
January 28, 2014 10:58 AM
|
According to the latest Snowden leaks, Britain's GCHQ can remotely control iPhones and Android devices using "targeted" tools. Meanwhile, the NSA can tap "leaky" apps to determine a person's age and location, and in some cases even their sexual orientation and political views.
|
Scooped by
Gust MEES
January 28, 2014 8:34 AM
|
New Snowden documents show the NSA and British spy agency GCHQ have looked at ways to collect age, location and gender data from apps like Google Maps and Angry Birds.
|
|
Scooped by
Gust MEES
February 17, 2015 4:39 AM
|
Mets-en de côté, ça peut servir.
La NSA ne dévoile pas toujours les failles qu'elle découvre. Il aurait fallu être naïf pour croire le contraire, et de nombreux indices et révélations vont dans ce sens depuis des années. Cela dit, que la Maison blanche l'admette et se fende d'un billet de blog pour détailler les procédures menant à la divulgation ou à la rétention de failles, c'est nouveau.
Learn more:
- http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
|
Scooped by
Gust MEES
April 11, 2014 4:24 PM
|
"Heartbleed" ist eine der größten Sicherheitslücken in der Geschichte des Internets - und der US-Geheimdienst NSA hat diese offenbar ausgenutzt. Laut Nachrichtenagentur Bloomberg soll der US-Geheimdienst schon lange davon gewusst haben.
Learn more:
|
Rescooped by
Gust MEES
from 21st Century Learning and Teaching
April 10, 2014 11:03 AM
|
The Heartbleed bug is unusually worrisome because it could possibly be used by the NSA or other spy agencies to steal your usernames and passwords — for sensitive services like banking, ecommerce, and web-based email — as well as the private keys that vulnerable web sites use to encrypt your traffic to them.
Either way, there are now signatures available to detect exploits against Heartbleed, as Dutch security firm Fox-IT points out on its website, and depending on how much logging companies do with their intrusion-detection systems, it may be possible to review activity retroactively to uncover any attacks going back over the last two years.
Learn more:
|
Scooped by
Gust MEES
March 18, 2014 2:17 PM
|
The surveillance system is capable of recording “100 percent” of calls in at least one foreign country. The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.
|
Scooped by
Gust MEES
March 13, 2014 1:51 PM
|
We already knew that the NSA has weaponized the internet, enabling them to "shoot" exploits at anyone they desire. But the Edward Snowden slides and story published yesterday convey a wealth of new detailed information about the NSA's technology and its limitations.
And that’s the bottom line with the NSA’s QUANTUM program. The NSA does not have a monopoly on the technology, and their widespread use acts as implicit permission to others, both nation-state and criminal.
|
Scooped by
Gust MEES
March 13, 2014 9:11 AM
|
Die NSA verfolgt mit der Technologie TURBINE Pläne, Millionen von Rechner automatisiert anzugreifen und mit Malware zu infizieren. Die Rechner könnten dann ausgespäht werden.
|
Scooped by
Gust MEES
March 13, 2014 8:59 AM
|
Parliament's consent to the EU-US trade deal
Parliament's consent to the EU-US trade deal "could be endangered" if blanket mass surveillance by the US National Security Agency does not stop, members of European Parliament said on Wednesday, in a resolution wrapping up their six-month inquiry into US mass surveillance schemes.
|
Scooped by
Gust MEES
February 17, 2014 8:14 AM
|
German Chancellor Angela Merkel is proposing building up a European communications network to help improve data protection. It would avoid emails and other data automatically passing through the United States.
In her weekly podcast, she said she would raise the issue on Wednesday with French President Francois Hollande.
|
Scooped by
Gust MEES
January 31, 2014 4:17 PM
|
Canada’s electronic spy agency has allegedly been using airport Wi-Fi to spy on its citizens. CBC News reports that the Communications Security Establishment Canada (CSEC) collected data over a...
|
Rescooped by
Gust MEES
from 21st Century Learning and Teaching
January 29, 2014 8:46 AM
|
Beyond device details, data shared over the internet by iOS and Android apps can include personal information such as age, gender, and location, while some apps share even more sensitive user infor...
|
Scooped by
Gust MEES
January 28, 2014 8:39 AM
|
The NSA and its British counterpart are tapping popular smartphone apps such as Angry Birds to peek into the tremendous amounts of very personal data those bits of software collect -- including age, location sex and even sexual preference.
|
Learn more:
- http://www.scoop.it/t/securite-pc-et-internet/?tag=REGIN
- http://www.scoop.it/t/securite-pc-et-internet/?tag=Warriorpride
- http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum
- http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar
- http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA
- http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO
- https://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/