E-Learning-Inclusivo (Mashup)
1.1M views | +5 today
Follow
E-Learning-Inclusivo (Mashup)
Aprendizaje con TIC basado en los aprendices.
Curated by juandoming
Your new post is loading...
Your new post is loading...
Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks

Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks | E-Learning-Inclusivo (Mashup) | Scoop.it
Germany's Der Spiegel published the new cache, which also shows the NSA struggled to fit all its surveillance data into Excel spreadsheets.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR



Via Gust MEES
Gust MEES's curator insight, December 30, 2014 9:22 AM
Germany's Der Spiegel published the new cache, which also shows the NSA struggled to fit all its surveillance data into Excel spreadsheets.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR


Rescooped by juandoming from ICT Security-Sécurité PC et Internet
Scoop.it!

OnionDuke: APT Attacks Via the Tor Network | Cyber Security

OnionDuke: APT Attacks Via the Tor Network | Cyber Security | E-Learning-Inclusivo (Mashup) | Scoop.it

Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.


The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR




Via Gust MEES
Gust MEES's curator insight, November 14, 2014 11:18 AM

Recently, research was published identifying a Tor exit node, located in Russia, that was consistently and maliciously modifying any uncompressed Windows executables downloaded through it. Naturally this piqued our interest, so we decided to peer down the rabbit hole. Suffice to say, the hole was a lot deeper than we expected! In fact, it went all the way back to the notorious Russian APT family MiniDuke, known to have been used in targeted attacks against NATO and European government agencies.


The malware used in this case is, however, not a version of MiniDuke. It is instead a separate, distinct family of malware that we have since taken to calling OnionDuke.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=TOR