(TFC) – For the non-technical persons who wish to have a baseline of security/privacy, here are the answers to the questions I get asked often: Mobile devices: Apple OS has generally less malware than Android OS. Both are quite insecure…
During the Cold War, the CIA did everything it’s accusing Russia of doing today — and more.
Even in an election year as shot through with conspiracy theories as this one, it would have been hard to imagine a bigger bombshell than Russia intervening to help Donald Trump. But that’s exactly what the CIA believes happened, or so unnamed “officials brief on the matter” told the Washington Post.
While Russia had long been blamed for hacking email accounts linked to the Clinton campaign, its motives had been shrouded in mystery. According to the Post, though, CIA officials recently presented Congress with a “a growing body of intelligence from multiple sources” that “electing Trump was Russia’s goal.”
A group of hackers has hacked the official website of Afghanistan’s National Security Council (NSC).
According to Tasnim dispatches, the hackers, dubbed Hazaristan Cyber Army, hacked and defaced the website of Afghanistan’s NSC on Friday.
They left a deface page along with photos of four senior Afghan officials and a brief message on the hacked website.
“We want justice and equality for all ethnic groups of Afghanistan. Security is either only deception or illusion… we will never give up (our fight) until justice is served,” part of the message read.
An initiative in the city of São Paulo, Brazil, seeks to combine political knowledge with hacker culture to democratize and strengthen development.
The Instituto Cidade Democrática (Democratic City Institute), in Brazil, is about to launch and coordinate a very interesting initiative, part of the public project Redes e Ruas (Streets and Networks) of the Municipality of São Paulo, called Laboratórios Livres de Participação Social (Free Labs for Social Participation).
The premise of the project is to unveil the universe of political participation in the internet by experimenting with four free applications that put collective intelligence at the service of communities.
In December 2014, the FBI received a tip from a foreign law enforcement agency that a Tor Hidden Service site called “Playpen” was hosting child pornography. That tip would ultimately lead to the largest known hacking operation in U.S. law enforcement history.
The Playpen investigation—driven by the FBI’s hacking campaign—resulted in hundreds of criminal prosecutions that are currently working their way through the federal courts. The issues in these cases are technical and the alleged crimes are distasteful. As a result, relatively little attention has been paid to the significant legal questions these cases raise.
This report examines the emergence of social media based surveillance in Thailand, carried out potentially by people’s own networks of friends and family. It looks at the severe impact this has on personal privacy and points to potential solutions.
In May 2014, Thailand experienced a military coup – its second in eight years. A military government led by General Prayut Chan-o-cha seized power and overthrew the administration of Prime Minister Yingluck Shinawatra. The Army declared martial law, which was maintained for the following 10 months, and an interim constitution was adopted in July 2014. The declaration of martial law allowed the Thai authorities to take strict public order measures, including reportedly closely monitoring of ‘delinquent’ behaviour such as eating sandwiches in the street or reading George Orwell’s books.
Hackers who allegedly infiltrated the DNC’s servers continue to raise the bar for info-jacking, and leaking. They’ve now moved to discredit repeated Clinton campaign denials that they too were had. A steaming hot cache of campaign documents, leaked to outlets, unveil the organization’s disturbing surveillance of journalists. The near Orwellian findings add to Clinton’s pattern of subversion and control of press and information freedom.
These most recent leaks were sent to the Smoking Gun, an outlet specializing in document acquisition. According to Smoking Gun, infiltrators targeted the email’s of staffers working in communications, campaign finance, and policy advisement.
America’s cyberwarfare defense begins with placing the word ‘ethical’ in front of actions barred under international law.
The US Navy posted a training solicitation last week, calling for interested personnel to sign-up for a ‘Certified Ethical Hacker’ program, a five-day course from June 6-10, in San Diego, California. The training represents the latest step by the US military to respond to an increase in global cyberwarfare.
According to the Navy, a ‘certified ethical hacker’ “is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in networks and/or computer systems and uses the same knowledge and tools as a malicious hacker upon request from an organization.”