background preloader

Networking, Security and Hacking

Facebook Twitter

Edward Snowden: Privacy can't depend on corporations standing up to the government. NSA whistleblower Edward Snowden opened the Free Software Foundation's LibrePlanet 2016 conference on Saturday with a discussion of free software, privacy and security, speaking via video conference from Russia.

Edward Snowden: Privacy can't depend on corporations standing up to the government

Snowden credited free software for his ability to help disclose the U.S. government's far-reaching surveillance projects – drawing one of several enthusiastic rounds of applause from the crowd in an MIT lecture hall. + ALSO ON NETWORK WORLD: Pwn2Own contest highlights renewed hacker focus on kernel issues + Apple engineers could walk away from FBI’s iPhone demands. Apple Engineers say they may Quit if ordered to Unlock iPhone by FBI. Apple Vs.

Apple Engineers say they may Quit if ordered to Unlock iPhone by FBI

FBI battle over mobile encryption case is taking more twists and turns with every day pass by. On one hand, the US Department of Justice (DOJ) is boldly warning Apple that it might compel the company to hand over the source code of its full iOS operating system along with the private electronic signature needed to run a modified iOS version on an iPhone, if… Anti-DDoS Firm Staminus HACKED! Customers Data Leaked. Staminus Communications – a California-based hosting and DDoS (Distributed Denial of Service) protection company – is recovering a massive data breach after hackers broke down into its servers and leaked personal and sensitive details of its customers.

Anti-DDoS Firm Staminus HACKED! Customers Data Leaked

CTB-Locker Ransomware Spreading Rapidly, Infects Thousands of Web Servers. In last few years, we saw an innumerable rise in ransomware threats ranging from Cryptowall to Locky ransomware discovered last week.

CTB-Locker Ransomware Spreading Rapidly, Infects Thousands of Web Servers

How to encrypt everything on Windows, OS X, iOS, and Android. The FBI’s inability to crack a terrorist’s iPhone 5c shows the strong protection you can get for your private information on a mobile device.

How to encrypt everything on Windows, OS X, iOS, and Android

ISIS group threatens Facebook and Twitter CEOs. Frustrated by social networks' efforts to keep them at bay, the terrorist group ISIS has made direct threats against the CEOs of Facebook and Twitter.

ISIS group threatens Facebook and Twitter CEOs

Chinese ISPs Caught Injecting Ads and Malware into Web Pages. China has gained a considerable global attention when it comes to their Internet policies in the past years; whether it's introducing its own search engine dubbed "Baidu," Great Firewall of China, its homebrew China Operating System (COP) and many more.

Chinese ISPs Caught Injecting Ads and Malware into Web Pages

Now, Chinese Internet Service Providers (ISPs) have been caught red-handed for injecting Advertisements as well as Malware through their network traffic. Three Israeli researchers uncovered that the major Chinese-based ISPs named China Telecom and China Unicom, two of Asia's largest network operators, have been engaged in an illegal practice of content injection in network traffic. Judge Confirms Government Paid CMU Scientists to Hack Tor Users for FBI. Everything is now crystal clear: The security researchers from Carnegie Mellon University (CMU) were hired by the federal officials to discover a technique that could help the FBI Unmask Tor users and Reveal their IP addresses as part of a criminal investigation.

Judge Confirms Government Paid CMU Scientists to Hack Tor Users for FBI

Yes, a federal judge in Washington has recently confirmed that the computer scientists at CMU's Software Engineering Institute (SEI) were indeed behind a hack of the TOR project in 2014, according to court documents [PDF] filed Tuesday. In November 2015, The Hacker News reported that Tor Project Director Roger Dingledine accused the Federal Bureau of Investigation (FBI) of paying the CMU, at least, $1 Million for providing information that led to the criminal suspects identification on the Dark Web. Apple is working on New iPhone Even It Can't Hack. Amid an ongoing dispute with the United States government over a court order to unlock iPhone 5C of one of the San Bernardino shooters Syed Farook…

Apple is working on New iPhone Even It Can't Hack

SD-WAN: What it is and why you’ll use it one day. IT manager gets 30 months in jail for code-bombing firm’s intellectual property. He could have gotten 10 years behind bars but this week a former IT manager at software maker Smart Online only got 30 months for sending malicious code that destroyed the company’s computers and data.

IT manager gets 30 months in jail for code-bombing firm’s intellectual property

+More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2015+ The Department of Justice said that according to the plea agreement, from 2007 to 2012, Nikhil Shah, 33 was an information technology manager at Smart Online Inc., of Durham, North Carolina, that develops mobile applications. Just One Device? No, Government wants Apple to Unlock 12 More iPhones. However, in addition to iPhone 5C belonged to San Bernardino shooter Syed Farook, the U.S. Justice Department is looking at court orders forcing Apple to help officials unlock at least 12 iPhones.

15-year-old Teenage Hacker Arrested Over FBI Computer Hack. Another 15-year-old teenager got arrested from the land of cakes, Scotland, by British Police for breaking into the FBI Systems on 16th February. Under the Britain’s anti-hacking law, Computer Misuse Act 1990, the boy has been arrested for his role in hacking and unauthorized access to the digital material. Federal Agents had fled to Glasgow in an attempt to carry out a raid on his home before proceeding with the boy's arrest.

Snowden-approved: The ‘Citizenfour’ hacker’s toolkit. One of the interesting reveals at the end of Citizenfour, the recent Academy Award-winning documentary about Edward Snowden, was the thanks it gives to various security software programs. The information that Snowden leaked two years ago continues to reverberate today, and it kicked off renewed interest in data security, privacy, and anonymity. Based on the closing credits in the movie, we’ve put together a guide to some of the major security software programs and operating systems available.

If you’ve wanted to take steps to secure your own information, but were uncertain where to start, this article should get you headed in the right direction. Browser Security: Tor. Privacy tools. You are being watched. It has become a fact that private and state sponsored organizations are spying on us. privacytools.io is here to give you the knowledge and tools to defend yourself against global mass surveillance. Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide. " I always say the same thing to them. I get out a pen, I write down my email address. How Spy Agencies Hacked into Israeli Military Drones to Collect Live Video Feeds. In a joint surveillance program, the US intelligence agency NSA (National Security Agency) and the British intelligence agency GCHQ (Government Communications Headquarters) hacked into, decrypted, and tracked live video feeds of Israeli Military Drones and Fighter Jets.

This could be one of the most shocking and embarrassing disclosures for Israel, who is the United States’ ally and prides itself on its technical capabilities. Dutch Police Training Eagles to Take Down Rogue Drones. Wikileak's Julian Assange Could Be Set Free On Friday by United Nation. The decision of the United Nations investigation into the Julian Assange case is set to be revealed and could order the release of Wikileaks founder on February 5. "BREAKING: UN set to announce decision on #Assange's release on Friday,"BREAKING: UN set to announce decision on #Assange's release on Friday," Wikileaks has tweeted. Assange has been living in the Ecuadorian embassy in London for over 3 years, after being granted political asylum by the Ecuadorian government of the South American country. Data breach numbers still high in 2015.

First light-based chip. Google's $1B to Apple for iOS search rights was a steal. Google paid Apple $1 billion in 2014 for the right to be the default search provider on iOS devices, including iPhones and iPads, according to a report by Bloomberg Thursday. Skype now hides your IP address to protect against attacks from online trolls. Skype is adding a new default security feature primarily to protect gamers from their overheated rivals. The Microsoft-owned service recently announced it would start hiding users’ IP addresses by default in the latest update to Skype. Previously, a Skype user’s IP address was not hidden, meaning hackers who knew what to look for could easily obtain your IP address and thus target your computer.

Mr Robot; Analysed. How VPNs work. Virtual Private Network or simply VPN is a personal network created over the internet, so that the devices connected over it can have an uninterrupted communication, regardless of any physical or digital barriers in the mid-way. The 25 worst passwords of 2015. Anonymous claims they Hacked Donald Trump ...Really? The 'Hacktivist' collective group Anonymous claimed to have leaked personal details of the controversial US presidential candidate Donald Trump, including his Mobile Phone Number and Social Security Number (SSN). Donald Trump. Florida Sheriff threatens to Arrest 'Rascal' Tim Cook if He Doesn't Unlock the iPhone. Network World. Networking. The Hacker News. 99hacking. The Intercept. E Hacking News - Latest Hacker News and IT Security News.

Web. Computer Networking. Tunneling Protocols. Random Subneting Question Generator. IPv4. IPv6.