HackDig : Dig high-quality web security articles for hacker

New Snowden Docs reveal the NSA spy hub Pine Gap in Australia

A news batch of documents leaked by Snowden has revealed a US facility in Australia for covertly monitoring communications and supporting drone missions A news batch of documents leaked by former NSA contractor Edward Snowden has revealed a United States facility located in Australia’s Northern Territory for covertly monitoring wireless communication
Publish At:2017-08-21 16:10 | Read:916 | Comments:0 | Tags:Breaking News Intelligence Drone Edward Snowden Hacking Join

WikiLeaks Dumps Docs on CIA’s Hacking Tools

WikiLeaks on Tuesday dropped one of its most explosive word bombs ever: A secret trove of documents apparently stolen from the U.S. Central Intelligence Agency (CIA) detailing methods of hacking everything from smart phones and TVs to compromising Internet routers and computers. KrebsOnSecurity is still digesting much of this fascinating data cache, but here
Publish At:2017-03-09 08:50 | Read:1094 | Comments:0 | Tags:Other Bloomberg Bugcrowd Casey Ellis Center for Cyber Intell

Lavabit, the Snowden recommended encrypted email service, is back

Lavabit, the Snowden recommended encrypted email service, is back. Its CEO Ladar Levison announced new privacy-enhancing features. Do you remember Lavabit? It was the US Encrypted Email Service used by the popular whistleblower Edward Snowden. Lavabit was an encrypted webmail service founded in 2004 by Ladar Levison, it closed on August 8, 2013 after the
Publish At:2017-01-21 15:15 | Read:2151 | Comments:0 | Tags:Breaking News Digital ID Hacking anonymity Dark Internet Mai

Trust: The Social Basis of the Internet Ecosystem

Societies function on the basis of trust, and Internet users are no different. Users need to trust the Internet. They need to trust it to keep their data secure, protected and private, and they need to trust it to reliably give them the content they want to view and share. If governed in an inclusive way, users will continue to place their trust in the inter
Publish At:2016-12-06 01:05 | Read:2059 | Comments:0 | Tags:Featured Articles Security Awareness Edward Snowden Privacy

DDoS Mitigation Firm Has History of Hijacks

Last week, KrebsOnSecurity detailed how BackConnect Inc. — a company that defends victims against large-scale distributed denial-of-service (DDoS) attacks — admitted to hijacking hundreds of Internet addresses from a European Internet service provider in order to glean information about attackers who were targeting BackConnect. According to an ex
Publish At:2016-09-20 22:45 | Read:2165 | Comments:0 | Tags:Other Akamai BackConnect Inc. BackConnect LLC Beckman Softwa

British MPs emails are routinely accessed by GCHQ

New documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails. According to Computer Weekly, new documents leaked by Edward Snowden reveal that both the British Intelligence and the NSA regularly intercept the British MPs emails and peers. The revelations have been made public throug
Publish At:2016-06-03 16:05 | Read:1746 | Comments:0 | Tags:Breaking News Intelligence Laws and regulations Edward Snowd

Sorry Mr. Snowden — encryption isn’t the only path to security

Last week, Google showed off a new messaging app called Allo. The reaction to that announcement was either extremely positive or negative, depending on who was speaking. General consumers liked the product because it built Google smarts into a messaging app, while privacy proponents decried the fact that end-to-end encryption was not a default feature of the
Publish At:2016-05-25 05:10 | Read:1669 | Comments:0 | Tags:Edward Snowden Encryption Google Messaging

2015 intelligence transparency report, the surveillance is still nosey

According to 2015 intelligence transparency report, the searches of US citizens made by the NSA and CIA intelligence agencies have almost doubled since 2013 If you believe that the Snowden‘s revelations have stopped or limited the surveillance activities you are obviously wrong. The diffusion of the technology and the increasing threats of espionage an
Publish At:2016-05-09 13:50 | Read:1140 | Comments:0 | Tags:Breaking News Digital ID Intelligence 2015 transparency repo

How terrorists abuse online services for propaganda?

Researchers at TrendMicro have analyzed online activities of terrorists identifying the techniques and tools used for their propaganda. Using vulnerabilities in software, websites, and web applications as attack vectors, hosting malicious components in cloud services. Other than this if there’s any service getting launched in the future, there will be
Publish At:2016-05-08 19:35 | Read:1629 | Comments:0 | Tags:Breaking News Terrorism Cybercrime Edward Snowden encryption

Redaction error reveals Feds ordered Lavabit to spy on Snowden

A redaction error in court-ordered release of the Lavabit case files confirmed that Edward Snowden was the target of the FBI. Lavabit was an encrypted webmail service founded in 2004 by Ladar Levison, it closed on August 8, 2013 after the US authorities ordered it to turn over its Secure Sockets Layer (SSL) private keys to order government surveillance activ
Publish At:2016-03-20 19:05 | Read:1706 | Comments:0 | Tags:Breaking News Laws and regulations Edward Snowden FBI Ladar

Utah systems experiences 300k hacking attacks a day due to the presence of the NSA Data Center

The representatives of the Utah State confirmed that their systems experiences 300,000 hacking attacks a day due to the presence of the NSA Data Center. The Utah state computer systems experience 300 million hacking attacks a day due to the presence of the NSA data center in the state. The Utah Data Center, also known as the Intelligence Community Comprehens
Publish At:2016-02-21 21:15 | Read:1337 | Comments:0 | Tags:Breaking News Hacking Intelligence Security Edward Snowden N

Anarchist operation, US and UK spied on Israeli UAVs and fighter jets

Anarchist operation – US and UK intelligence secretly tapped into live video feeds from Israeli UAVs and fighter jets, monitoring military operations. According to a new lot of documents leaked by the popular whistleblower Edward Snowden, the US and British intelligence agencies have hacked for years into Israeli Air Sur
Publish At:2016-01-29 12:35 | Read:1231 | Comments:0 | Tags:Breaking News Cyber warfare Intelligence Anarchist operation

Tails 2.0 is out to protect your privacy and anonymity

Tails 2.0 is available for download, it implements new features, including security improvements. Speaking about privacy and operating system, we are obliged to mention the popular Debian-based distribution Tails “The Amnesiac Incognito Live System.” Now the version 2.0 is available online! Tails is a popular live operating sy
Publish At:2016-01-28 18:30 | Read:1318 | Comments:0 | Tags:Breaking News Digital ID Security anonymity Edward Snowden l

The German intelligence agency BND resumed surveillance activities with the NSA support

According to the German media the German intelligence agency BND has resumed the monitoring activities conducted in a joint effort with the US NSA. It seems that the German government has never suspended the surveillance activities on its unaware population, to be precise monitoring activities conducted in a joint effort with
Publish At:2016-01-11 10:35 | Read:2366 | Comments:0 | Tags:Breaking News Intelligence BND cyber espionage Edward Snowde

Signal Encrypted Messaging Comes to Desktop

In March when Moxie Marlinspike and Open Whisper Systems released the iOS version of the Signal encrypted messaging app, the noted security researcher promised to expand its reach and among other things, eventually release a desktop version of Signal.That vision was realized on Wednesday with the public availability of the Signal Desktop beta, written by Ope
Publish At:2015-12-03 23:40 | Read:1025 | Comments:0 | Tags:Cryptography Government Mobile Security Privacy cryptography


Share high-quality web security related articles with you:)


Tag Cloud