background preloader

Use These Secret NSA Google Search Tips to Become Your Own Spy Agency

Use These Secret NSA Google Search Tips to Become Your Own Spy Agency
There’s so much data available on the internet that even government cyberspies need a little help now and then to sift through it all. So to assist them, the National Security Agency produced a book to help its spies uncover intelligence hiding on the web. The 643-page tome, called Untangling the Web: A Guide to Internet Research (.pdf), was just released by the NSA following a FOIA request filed in April by MuckRock, a site that charges fees to process public records for activists and others. The book was published by the Center for Digital Content of the National Security Agency, and is filled with advice for using search engines, the Internet Archive and other online tools. But the most interesting is the chapter titled “Google Hacking.” Say you’re a cyberspy for the NSA and you want sensitive inside information on companies in South Africa. Want to find spreadsheets full of passwords in Russia? Related:  search strategies, bookmarkingTo Read

Rick752's EasyPrivacy for Adblock Plus Labs Archives Get cutting-edge security as it happens. Read our experts’ tips and techniques to help you avoid and defeat the latest malware trends, and view portions of their actual research to stay even more informed. Money acts as one of the key drivers for cybercrime. Add to this cybercrime’s lower risk than traditional crime, and there is little wonder that we are witnessing the evolution of crime to the digital sphere. In previous research papers, we focused on the service-based nature of cybercrime, in which anybody can be a cybercriminal […] Mobile banking Trojans have usually pretended to be security applications (for example, Zitmo) or legitimate banking apps (FakeToken or FkSite a.k.a. During recent weeks we’ve seen a new botnet kit advertised in several Russian forums. Update: 4/11/2014 McAfee’s Heartbleed Test tool has been posted and enables users to test sites for the presence of this vulnerability. ———- A recent vulnerability in OpenSSL is causing quite a stir.

Big Data: ce n’est pas la taille qui compte Si votre data est trop petite, votre concurrent va vous écraser et vous piquer votre petite copine. Voilà, résume avec humour Christopher Mims sur le site Quartz, le message sous-jacent qui tourne en boucle chez les consultants spécialisés qui veulent faire du fameux Big data la prochaine poule aux oeufs d’or de leur activité. Plus une conférence sérieuse de business, marketing ou management ne pourrait se tenir sans son volet «Big data» sur le thème «Comment la data va révolutionner votre business» (et vous permettre de garder votre copine). publicité Il ne fait aucun doute que le monde produit, stocke, amasse beaucoup, beaucoup, beaucoup de données de nature très variées. Partout, on voit fleurir ces powerpoints d'entreprises illustrant comment les bases de données, les modèles statistiques et le «cloud» vont permettre aux entreprises de gagner plus d’argent en analysant leurs ventes, leurs stocks, leurs stratégies marketing. Une conférence de «Big data», ça finit souvent comme ça...

Resurrect Pages Weblog : News from the Lab Whether he's the guy or not… it fits the typical profile. A young person with good SEO skills pushing a rather useless app. Lame "SEO apps" are prevalent on Google Play. They're easy to find if you look. For example: • Best Antivirus Lite • SAFE antivirus Limited • Skulls Antivirus • Shnarped Hockey antivirus lite Best and SAFE link to one "developer" — while Skulls and Shnarped Hockey link to another. Though there are two different developers… the apps are identical apart from their name. Android apps: no developer skills required. So what do the apps do? Well, the "antivirus" open sa screen label "anti spyware". Hmm, the terms changed. Click "Start Scan" and the app does a basic scan of permissions for installed apps. Google Play: caveat emptor. P.S. Check out F-Secure App Permissions for Android. There has been plenty of noise about Heartbleed, so if you're an admin, you already know what to do. 1. As recommended reading we would suggest: OWASP Transport Layer Protection Cheat Sheet 5. 6.

Here's How Reddit's Communities Are Interconnected The best part of browsing Reddit comments (besides the awesome pun threads) is discovering a new subreddit — a community so niche or fine-tuned to your interests that you can't imagine life before subscribing to it. SEE ALSO: 5 Fascinating Facts We Learned From Reddit This Week In fact, if you spend time in certain subreddits, you'll find common links to others. For example, users in r/books often link to r/scifi and r/fantasy. And r/Android links frequently to r/AndroidDev and r/AndroidApps. The resulting "cliques" are great places to find and trade content about related topics. If you've ever wondered what these interconnected communities might look like mapped out, you're in luck. Because popular subreddits like r/pics and r/funny cover a broad range of content and link to other subs indiscriminately, sharkbait784 implemented a link threshold to keep the graph readable. The screenshots don't do the map justice. Images courtesy of sharkbait784.

Google's uProxy: A Peer-to-Peer Gateway to Internet Freedom In parts of the world where repressive governments control the Internet with unassailable firewalls, netizens don't see the same web that people in other countries can. Now, Google wants to give people in these countries a tool to circumvent those invisible barriers, and defeat censorship. Called uProxy, it is meant to be an easy-to-use, peer-to-peer gateway to the open Internet. With uProxy installed, somebody in Iran could use a friend's Internet to connect with him or her. Though Google announced uProxy on Monday at the Google Ideas Summit in New York, N.Y., the tool isn't ready to be made public yet, and the Internet giant isn't comfortable announcing a release date. First, it wants to roll it out for a few "trusted testers" to improve it and make it more secure. The user in Iran, for instance, would be able to ask a friend in the United States via chat to activate uProxy. "It's basically a personalized VPN [Virtual Private Network]," Dixon told Mashable in an interview.

SQLMAP Basic Introduction and Tutorial There are times when manual efforts just wont work or you plain dont have the skills and other famous tools like Havij dont seem to do the trick either. I experienced one of these times recently and it lead me to another great tool that just doesn't seem to be as popular - SQLMAP. I had a site the other day I was working on my injections with and could not get it manually due to poor skills at timing things, reading results, and PATIENCE. Havij was cracking out due to timing method sucking and I dont have skills to do it manually (props to those that can), so here is a tutorial I put together on how to go about cracking this thing wide open using the less commonly known tool SQLMAP. There is no need to waste time with $hitcash and other download sites. You will simply extract this to the desired folder you want to run and use it from. OK now you should be ready to get the command prompt and type sqlmap or sqlmap.exe to see if you set the path variable correctly.

Etudes - Les « Millenials », champions du numérique ! L’Observatoire International de la Média Democratie (State of the Media Democracy) présenté aujourd’hui par Deloitte, livre une analyse comparative par pays (France, Etats-Unis, Australie, Allemagne, Italie, Japon, Corée du Sud, Norvège, Espagne et Royaume-Uni) mettant en exergue les tendances clés des consommateurs dans le domaine du numérique. Pour cette étude, 2 124 internautes français représentatifs en termes géographiques et économiques, sur quotas de sexe et sur 5 tranches d’âge ont été interrogés en ligne fin 2012. Et une population se démarque : les « Millenials », adeptes des technologies numériques. Ci-dessous les 9 enseignements de Deloitte : 1. 20 % des Français disposent à la fois d’un ordinateur, d’une tablette et d’un smartphone. Crédits : Deloitte Malgré un enrichissement des fonctions des différents équipements mobiles, chacun se concentre sur un cœur d’usage. 2. L’accès à Internet est le service à domicile plébiscité par 77% des foyers français. 7. 8. 9.

How Google Dominates Us (book review, includes search theory) In the Plex: How Google Thinks, Works, and Shapes Our Lives by Steven Levy Simon and Schuster, 424 pp., $26.00 I’m Feeling Lucky: The Confessions of Google Employee Number 59 by Douglas Edwards Houghton Mifflin Harcourt, 416 pp., $27.00 The Googlization of Everything (and Why We Should Worry) by Siva Vaidhyanathan University of California Press, 265 pp., $26.95 Search & Destroy: Why You Can’t Trust Google Inc. by Scott Cleland with Ira Brodsky Telescope, 329 pp., $28.95 Tweets Alain de Botton, philosopher, author, and now online aphorist: The logical conclusion of our relationship to computers: expectantly to type “what is the meaning of my life” into Google. You can do this, of course. Google is where we go for answers. The business of finding facts has been an important gear in the workings of human knowledge, and the technology has just been upgraded from rubber band to nuclear reactor. Most of the time Google does not actually have the answers. “That’s true,” said Brin.

Internet Census 2012 All data collected during the Internet Census 2012 is available for download via BitTorrent. It is released into public domain so everybody can use it for any purpose. For an explanation of what this data is and how it was obtained, see Paper. The full download is 568GB large. The data is compressed using ZPAQ 1.10, which is default in Debian and Ubuntu. Torrent MAGNET LINK Download torrent file (6MB) The tables below show a small sample of every dataset as well as the number of records and the compressed and decompressed size. ICMP Ping 52 Billion records 81.8GB ZPAQ > 1.8 TB unpacked Result times in 10uS Statistics on how many probes were stored per hour.