HackDig : Dig high-quality web security articles for hackers

EncroChat system eavesdropped on by law enforcement

Due to the level of sophistication of the attack, and the malware code, we can no longer guarantee the security of your device. This text caused a lot of aggravation, worries, and sleepless nights. No one wants to hear the security of their device has been compromised by a malware attack. The good news is that the actual victims of this malware attack wer
Publish At:2020-07-22 16:05 | Read:530 | Comments:0 | Tags:Hacking cryptophone encrochat encryption end-to-end encrypti

Facial recognition: tech giants take a step back

Last week, a few major tech companies informed the public that they will not provide facial recognition software to law enforcement. These companies are concerned about the way in which their technology might be used. What happens when software that threatens our privacy falls into the hands of organization which we no longer trust? In general, being awar
Publish At:2020-06-18 13:50 | Read:544 | Comments:0 | Tags:Artificial Intelligence Privacy ACLU AI amazon biometrics EF

Going dark: encryption and law enforcement

UPDATE, 05/22/2020: In the advent of the EARN IT Act, the debate on government subversion of encryption has reignited.  Given that the material conditions of the technology have not changed, and the arguments given in favor of the bill are not novel, we’ve decided to republish the following blog outlining our stance on the subject. Originally published
Publish At:2020-05-24 07:20 | Read:621 | Comments:0 | Tags:Government Privacy Security world backdoor Department of Jus

Clearview AI loses entire database of faceprint-buying clients to hackers

byLisa VaasClearview AI, the controversial facial recognition startup that’s gobbled up more than three billion of our photos by scraping social media sites and any other publicly accessible nook and cranny it can find, has lost its entire list of clients to hackers – including details about its many law enforcement clients.In a notification that
Publish At:2020-02-28 09:16 | Read:981 | Comments:0 | Tags:Data loss Law & order Privacy Security threats AI Artificial

Facial recognition firm Clearview AI reveals intruders stole its client list

Bad news for the controversial facial recognition startup Clearview AI, hackers gained “unauthorized access” to a list of all of its customers.  The controversial facial-recognition company that contracts with law-enforcement agencies announced that attackers have gained unauthorized access to its entire client list. The company already infor
Publish At:2020-02-27 17:30 | Read:744 | Comments:0 | Tags:Breaking News Data Breach Hacking Clearview AI facial recogn

ISPs in at least two countries were involved in delivering surveillance FinFisher Spyware

Security researchers at ESET have uncovered a surveillance campaign using a new variant of FinFisher spyware, also known as FinSpy. Finfisher infected victims in seven countries and experts believe that in two of them the major internet providers have been involved. “New surveillance campaigns utilizing FinFisher, infamous spyware known also as FinSpy
Publish At:2017-09-21 20:20 | Read:5119 | Comments:0 | Tags:Breaking News Cyber Crime Cyber warfare Hacking Intelligence

FBI masqueraded the NIT in a video-bait to unmask sextortionist on Tor

The FBI used a NIT involving a specially crafted video file to unmask a sextortionist that via Tor was threatening youngsters. The FBI has used once again the network investigative technique (NIT) for unmasking Tor users, this time the feds used it to arrest a suspected sextortionist. The man is accused of having tricked young girls into sharing nude pics o
Publish At:2017-08-10 03:20 | Read:5686 | Comments:0 | Tags:Breaking News Cyber Crime Deep Web Hacking anonymity child p

Prisons and Courts Bill allows mobile networks to deploy IMSI catchers outside of prisons

The new UK Prisons and Courts Bill will let mobile networks to deploy IMSI catchers outside of prisons to snoop on mobile phone users. The Prisons and Courts Bill, introduced to Parliament last week, will let mobile networks to deploy IMSI catchers outside of prisons to snoop on mobile phone users. The IMSI catchers are surveillance equipment used for interc
Publish At:2017-02-28 06:45 | Read:3742 | Comments:0 | Tags:Breaking News Digital ID Laws and regulations Mobile IMSI ca

Privacy groups claim FBI hacking operation in the PlayPen case was unconstitutional

According to Privacy groups, the FBI search warrant used to hack into thousands of computers around the world in the PlayPen case was unconstitutional, Privacy groups are claiming the FBI hacking campaign against the Playpen child pornography community violated international law. According to the court documents, the FBI monitored the Playpen bulletin board
Publish At:2017-02-12 03:10 | Read:5393 | Comments:0 | Tags:Breaking News Deep Web Hacking Intelligence Laws and regulat

Data breach notification website LeakedSource raided by feds

LeakedSource is down! According to a message appeared in the OGF forum, the popular data breach notification website has apparently been raided by feds. The Data breach notification website LeakedSource has apparently been raided by feds. The service is one of the most important available online, it reported some of the largest data breaches last year and no
Publish At:2017-01-27 00:15 | Read:4407 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Cybercrime data breach

Not so Limitless after all: Trend Micro FTR Assists in the Arrest of Limitless Author

On January 13, college student Zachary Shames pleaded guilty to a federal district court in Virginia, US, for authoring Limitless Logger, the malicious keylogger that was used to steal thousands of sensitive user information like passwords and banking credentials. In November 2014, Trend Micro’s Forward Looking Threat Research team (FTR) published a research
Publish At:2017-01-19 14:25 | Read:5579 | Comments:0 | Tags:Malware Targeted Attacks arrest law enforcement limitless

How much cost a StingRay? Surveillance is a profitable business

Motherboard published an interesting blog post which includes further details on the cost of StingRay phone surveillance equipment. A couple of years ago I published a post on Stingray Technology trying to explain how governments track cellular devices. A StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by th
Publish At:2016-12-12 06:55 | Read:4519 | Comments:0 | Tags:Breaking News Digital ID Hacking Laws and regulations Securi

Avalanche: Thwarting Cybercriminal Hazards with Law Enforcement Collaboration

On November 30th, an international law enforcement operation stamped out Avalanche, a large-scale content and management platform designed for the delivery of bullet-proof botnets. Avalanche’s scale and scope spanned victims from 180 countries, over 800,000 domains in 60+ top-level domains (TLD), more than one million phishing and spam e-mails, 500,000 infec
Publish At:2016-12-07 22:10 | Read:6083 | Comments:0 | Tags:Botnets Malware Avalanche banking malware botnet law enforce

UK Police purchased IMSI-catcher technology for mobile surveillance

According to documents analyzed by The Bristol Cable media Agency, the UK authorities have purchased IMSI-catcher equipment. Privacy advocates and rights groups are in revolt against the UK law enforcement that has purchased mobile phone snooping technology. The rights groups are protesting against the adoption of the IMSI-catcher technology that could be us
Publish At:2016-10-17 06:25 | Read:4749 | Comments:0 | Tags:Breaking News Digital ID Laws and regulations IMSI catcher l

No doubt, events demonstrate that Signal is the most secure messaging app

Why Signal is considered the most secure instant messaging app? It stores only a few information about its users, and the events demonstrate it. Despite many of the most popular apps are implementing end-to-end encryption, not all applications are equal. Security experts recommend Signal for secure communications, in the aftermath of the DNC hack the staffe
Publish At:2016-10-05 19:55 | Read:3375 | Comments:0 | Tags:Breaking News Digital ID Hacking Malware end-to-end-encrypti

Tools

Tag Cloud