HackDig : Dig high-quality web security articles for hacker

The New Battlefield: Why Nation-State Malware is Winning

This warfare is being fought with computers and special created malware. It is Cyber Warfare and every large nation is playing along The most recent exposed vulnerability from Microsoft demonstrates exactly the type of method Nation-State attackers’ use. So how does a nation as sophisticated as the United States keep losing the cyber battle? The problem lie
Publish At:2017-04-25 18:10 | Read:3476 | Comments:0 | Tags:Government Threats Battlefield CIA criminals Federal governm

WikiLeaks published the user guide for the CIA Weeping Angel, the Samsung Smart TV Hacking Tool

WikiLeaks published the user guide related to the hacking tool allegedly used by the CIA, code-named Weeping Angel, to hack Samsung Smart TV. WikiLeaks has published a new document included in the Vault7 archive containing technical details about another hacking tool allegedly used by the U.S. Central Intelligence Agency (CIA). This time, the organization ha
Publish At:2017-04-21 17:25 | Read:2954 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Intelligence Internet of

Vault7 Dark Matter batch – CIA has been targeting the iPhone supply chain since at least 2008

Wikileaks released the second bash of CIA’s Vault 7 dump, it contains other precious documents to understand the way CIA was hacking systems worldwide. The Wikileaks Vault 7 dump will make for a long time the headlines, the organization has just released another lot of classified documents related the hacking tools and techniques and exploit codes used
Publish At:2017-03-23 18:00 | Read:3967 | Comments:0 | Tags:Breaking News Intelligence Apple CIA Dark Matter Firmware Ha

CIA Vault7 Leak – Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution flaw

After the leak of the CIA Vault7 archive, experts from CISCO warn of Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution flaw. Recently Wikileaks announced it is planning to share with IT firms details about vulnerabilities in a number of their products, the flaw are exploited by the hacking tools and techniques included in the CI
Publish At:2017-03-20 16:20 | Read:4485 | Comments:0 | Tags:Breaking News Hacking CIA CISCO cyber espionage Intelligence

WikiLeaks will disclose CIA exploits to tech companies under specific conditions

Assange sent an email to tech firms including “a series of conditions” that they need to fulfill before gaining access to details included in the Vault 7. A couple of weeks ago Wikileaks published the Vault 7 archive, a huge trove of files detailing CIA hacking tools and capabilities. The files allegedly originated from a high-security network of
Publish At:2017-03-19 03:15 | Read:2845 | Comments:0 | Tags:Breaking News Hacking Intelligence CIA cyber espionage IoT m

In the Wake of the CIA WikiLeaks Case, Some Tips on Corporate Cybersecurity

Year Zero, the first delivery from WikiLeaks of the “biggest document leak” the Central Intelligence Agency has ever seen, is made up of over 8,000 files. The revelations they contain are causing quite a stir. If nothing else, they’ve shown that the CIA has at its disposal an enormous cyberespionage arsenal. The documents detail how cyberweapons were prepare
Publish At:2017-03-17 05:45 | Read:4626 | Comments:0 | Tags:News cia Wikileaks zero day

Four Men Charged With Hacking 500M Yahoo Accounts

“Between two evils, I always pick the one I never tried before.” -Karim Baratov (paraphrasing Mae West) The U.S. Justice Department today unsealed indictments against four men accused of hacking into a half-billion Yahoo email accounts. Two of the men named in the indictments worked for a unit of the Russian Federal Security Service (FSB) that se
Publish At:2017-03-16 09:50 | Read:3415 | Comments:0 | Tags:Other Alexsey Alexseyevich Belan Central Intelligence Agency

CHIPSEC, Intel Security releases detection tool also for CIA EFI rootkits

After CIA leak, Intel Security releases CHIPSEC, a detection tool for EFI rootkits that detect rogue binaries inside the computer firmware. A few days ago, WikiLeaks announced it is working with software makers to fix the zero-day flaws in Vault7 dump that impacted their products and services. The organization is sharing information on the hacking tools inc
Publish At:2017-03-13 18:05 | Read:4684 | Comments:0 | Tags:Breaking News Hacking CHIPSEC CIA Intel QuarkMatter UEFI Vau

WikiLeaks is working with software makers on Zero-Days included in the Vault7 dump

WikiLeaks announced is working with software makers on Zero-Days by sharing information on the hacking tools included in the Vault7 dump with them. WikiLeaks announced on Tuesday that it has obtained thousands of files allegedly originating from a high-security network of the U.S. Central Intelligence Agency (CIA). The Wikileaks dump, called “Vault7,” expose
Publish At:2017-03-11 07:40 | Read:2961 | Comments:0 | Tags:Breaking News Digital ID Intelligence CIA cyber espionage Ha

CIA replies to WikiLeaks Vault7 Leak, it is operating to protect Americans

WikiLeaks Vault7 – CIA pointed out that its mission is to “aggressively collect” foreign intelligence from overseas entities. The U.S. Central Intelligence Agency (CIA) has issued an official statement in response to the Wikileaks Vault7 Data leak. The US intelligence agency denies conducting a large-scale surveillance on its citizens. According to an
Publish At:2017-03-10 13:15 | Read:2550 | Comments:0 | Tags:Breaking News Data Breach Intelligence CIA data leak Wikilea

Wikileaks CIA Files – What this means for Internet security and encryption

Earlier today, Wikileaks dumped a large database of secret documents from the CIA in a released dubbed Vault7. Here we do a deeper analysis of the leak and the broader implications on online security and encrypted services. Our in-depth analysis of the leaked CIA files is found at the bottom of this post. First, we will discuss the main question on everybody
Publish At:2017-03-09 00:25 | Read:3413 | Comments:0 | Tags:Breaking News Data Breach Intelligence CIA Hacking surveilla

Wikileaks Vault7: CIA Umbrage team, the factory of false flag ops

Wikileaks Vault7 data leak –  the Umbrage team was tasked by the Central Intelligence Agency for false flag hacking operations. WikiLeaks has obtained thousands of files allegedly originating from a CIA high-security network that details CIA hacking tools and capabilities.Digging in the huge trove of files, it is possible to find information about the
Publish At:2017-03-09 00:25 | Read:3282 | Comments:0 | Tags:APT Cyber warfare Data Breach Hacking Intelligence Malware C

WikiLeaks releases documents detailing CIA hacking tools and capabilities

WikiLeaks has obtained thousands of files allegedly originating from a CIA high-security network that details CIA hacking tools and capabilities WikiLeaks announced on Tuesday that it has obtained thousands of files allegedly originating from a high-security network of the U.S. Central Intelligence Agency (CIA). The huge trove of data, called “Vault 7,” expo
Publish At:2017-03-08 06:00 | Read:2484 | Comments:0 | Tags:APT Data Breach Intelligence CIA cyber espionage Hacking IoT

Thieving Magpie allows NSA spies to snoop on in-flight mobile calls

The Thieving Magpie programme allows the NSA and the GCHQ to intercept data from passengers traveling on board commercial aircrafts. This isn’t a sci-fi movie, the GCHQ and the NSA have spied on air passengers using in-flight GSM mobile services for years. The news was revealed by new documents obtained by Edward Snowden and recently published by The I
Publish At:2016-12-09 04:50 | Read:3806 | Comments:0 | Tags:Breaking News Hacking Intelligence CIA GCHQ NSA surveillance

The Benefits of Sharing Information for IT and Security

Confidentiality, Integrity and Availability – those are the three pillars of the CIA triad model for information security.Here’s something you might not have known: in reverse order, those same pillars apply to IT Operations. Think about it. In a world of agility and enablement, the availability, integrity and confidentiality of the systems and process
Publish At:2016-09-13 16:10 | Read:3526 | Comments:0 | Tags:IT Security and Data Protection Availability CIA Confidentia

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud