HackDig : Dig high-quality web security articles for hackers

EncroChat system eavesdropped on by law enforcement

Due to the level of sophistication of the attack, and the malware code, we can no longer guarantee the security of your device. This text caused a lot of aggravation, worries, and sleepless nights. No one wants to hear the security of their device has been compromised by a malware attack. The good news is that the actual victims of this malware attack wer
Publish At:2020-07-22 16:05 | Read:209 | Comments:0 | Tags:Hacking cryptophone encrochat encryption end-to-end encrypti

Adobe accidentally leaked online its Private PGP Key

The Adobe product security incident response team (PSIRT) accidentally published a private PGP key on its blog, once discovered the issue it quickly revoked it. On Friday, the Adobe PSIRT updated its Pretty Good Privacy (PGP) key and published the new public key on the blog post. The new key should have been valid until September 2018, but something strange
Publish At:2017-09-25 16:35 | Read:4758 | Comments:0 | Tags:Breaking News Digital ID Hacking Adobe data leak PGP PGP key

Ennetcom – Dutch Police confirmed to have decrypted BlackBerry PGP messages in a criminal case

The Dutch police decrypted a number of PGP messages sent by crooks through their BlackBerry mobile devices for the criminal investigation on Ennetcom. PGP is an open source end-to-end encryption standard that can be used to sign emails, files, documents, or disk partitions. On April 2016, the Dutch Police arrested a 36-year-old man on suspicion of money laun
Publish At:2017-03-11 07:40 | Read:8752 | Comments:0 | Tags:Breaking News Cyber Crime BlackBerry crime Cybercrime encryp

The Google E2EMail is now fully community-driven open source project

Google has now announced that E2EMail is no more a Google product, instead, it has become a “fully community-driven open source project.” The End-to-End crypto library is a core component of several projects of the IT giant such as the E2EMail, a Chrome app that runs independent of the normal Gmail web interface and allows non-technical users to exchange enc
Publish At:2017-03-01 19:40 | Read:3352 | Comments:0 | Tags:Breaking News Digital ID E2EMail encryption Google PGP Pierl

PGP: Still hard to use after 16 years

Earlier this month, SC magazine ran an article about this tweet from Joseph Bonneau at the Electronic Frontier Foundation: Email from Phil Zimmerman: “Sorry, but I cannot decrypt this message. I don’t have a version of PGP that runs on any of my devices” PGP, short for Pretty Good Privacy, is an email encryption system invented by Phil Zimm
Publish At:2015-09-24 17:25 | Read:3549 | Comments:0 | Tags:Uncategorized AES cryptographer encrypting email encryption

Despite Hacking Team’s poor opsec, CEO came from early days of PGP

Further ReadingDays after Hacking Team breach, nobody fired, no customers lostEric Rabe: "The company is certainly in operation. We have a lot of work to do."Many years before his corporate e-mails would be plastered all over the Internet following a major security breach of his company, a young David Vincenzetti often posted to various Usenet groups, ge
Publish At:2015-07-08 17:15 | Read:4673 | Comments:0 | Tags:Law & Disorder Risk Assessment David Vincenzetti milan pgp U

Once-starving GnuPG crypto project gets a windfall. Now comes the hard part

For almost two decades, the open source GnuPG encryption project has teetered on the brink of insolvency. Now, following word of that plight, the lone developer keeping the project alive has received more than $135,000—in a single day, no less.Short for Gnu Privacy Guard, GnuPG or simply GPG was first conceived in 1997. It makes up the guts that run GpG4
Publish At:2015-02-07 00:05 | Read:3861 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab crypto cryptog

DNS cache poisoning attacks to steal emails are reality

CERT warns that DNS Cache Poisoning attacks could be used also to hijack email to a rogue server and not only to divert the Internet traffic. DNS attacks are very popular in hacking community, they could be run by cyber criminals and state-sponsored hackers for various purposes, including cyber espionage and financially motiva
Publish At:2014-09-13 20:20 | Read:4098 | Comments:0 | Tags:Cyber Crime Hacking Security cache poisoning CERT DNS dns at

We need to talk about email

Sometimes big security problems go unfixed for so long that they sort of disappear.They can disappear without being fixed or mitigated. They can disappear without anyone forgetting they exist or forgetting that they're serious. They can disappear just because they become normal.Today the people of the world will exchange about 250 billion messages using a sy
Publish At:2014-08-22 15:30 | Read:4048 | Comments:0 | Tags:Cryptography Featured Google Google Chrome Yahoo email Encry

Is e-mail OK for secret stuff?

Image by EFF Short answer: No. Slightly longer answer: Maybe, but not without additional protection. E-mail is one of the oldest and most widely used services on Internet. It was developed during an era when we were comfortably unaware of viruses, worms, spam, e-crime and the NSA. And that is clearly visible in the architecture and blatant lack of security
Publish At:2014-08-15 08:50 | Read:6902 | Comments:0 | Tags:email Online Threats Privacy Security communication confiden

Yahoo to begin offering PGP encryption support in Yahoo Mail service

In an interview with the Wall Street Journal, Stamos acknowledged that the introduction of encryption will require some amount of education for users to make sure their privacy expectations are set appropriately. For example, he explained that PGP encryption won’t cloak the destination of your e-mail. "We have to make it clear to people it is not [a] secret
Publish At:2014-08-11 21:16 | Read:4145 | Comments:0 | Tags:Risk Assessment EFF email encrypted email encryption end-to-


Tag Cloud