Tag: Electronics

Russian Hackers Read Obama’s Unclassified Emails, Officials Say

1000clapper

WASHINGTON — Some of President Obama’s email correspondence was swept up by Russian hackers last year in a breach of the White House’s unclassified computer system that was far more intrusive and worrisome than has been publicly acknowledged, according to

Americans’ Cellphones Targeted in Secret U.S. Spy Program

germany-feara-nsa-stole-industrial-secrets-282089_o

WASHINGTON—The Justice Department is scooping up data from thousands of mobile phones through devices deployed on airplanes that mimic cellphone towers, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar

Hackers breach some White House computers

WhiteHouse

Hackers thought to be working for the Russian government breached the unclassified White House computer networks in recent weeks, sources said, resulting in temporary disruptions to some services while cybersecurity teams worked to contain the intrusion. White House officials, speaking

Hackers Used Windows Bug to Spy on Ukraine Officials

virus2

For months this summer, unidentified hackers used a previously unknown hole in Microsoft Corp. ’s Windows operating system to spy on North Atlantic Treaty Organization and Ukrainian officials, according to an investigation by a U.S. cybersecurity company. Microsoft released a

The NSA has a plan to map the entire Internet

Treasure_Map

When it comes to choosing code names for their secret operations, American and British agents demonstrate a flare for creativity. Sometimes they borrow from Mother Nature, with monikers such as “Evil Olive” and “Egoistic Giraffe.” Other times, they would seem

NSA, GCHQ have secret access to German telecom networks – report

donut.gif

US and UK intelligence services have secret access points for German telecom companies’ internal networks, Der Spiegel reports, citing slides created in the NSA’s ‘Treasure Map’ program used to get near-real-time visualization of the global internet. The latest scandal continues

Fake Cell Towers Allow the NSA and Police to Keep Track of You

Source: Newsweek

The Internet is abuzz with reports of mysterious devices sprinkled across America—many of them on military bases—that connect to your phone by mimicking cell phone towers and sucking up your data. There is little public information about these devices, but

Chinese officials fear Apple products may be tools for U.S. espionage

apple_nsa

BEIJING – Edward Snowden might not be such a popular figure among Chinese officials any more, after it emerged this week that government money won’t be spent on iPads or MacBooks any more because of concerns about U.S. spying. Snowden’s

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones

NSA surveillance program revelations continue to surface

Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones.

CIA rendition jet was waiting in Europe to SNATCH SNOWDEN

split

As the whistleblowing NSA sysadmin Edward Snowden made his dramatic escape to Russia a year ago, a secret US government jet – previously employed in CIA “rendition” flights on which terror suspects disappeared into invisible “black” imprisonment – flew into

Second Chinese military unit linked to cyber espionage

chinese 500_thumb

CrowdStrike, a U.S security firm, detailed the allegations in a lengthy report on a People’s Liberation Army unit operating in Shanghai.  The report comes just weeks after the U.S. Department of Justice accused five members of the Chinese military of

No, you can’t remotely turn on phones

nsa_eye11

In the NBC interview, Snowden confirms that the NSA can remotely turn on Brian William’s phone. This isn’t true. Just because the NSA can hack into a lot of phones doesn’t mean it can hack a specific model of phone

Iran-based hackers reportedly target US officials for sanctions, anti-nuclear intelligence

stuxnet

Hackers apparently based in Iran have mounted a three-year campaign of cyber-espionage against high-ranking U.S. and international officials, including a four-star admiral, to gather intelligence on economic sanctions, antinuclear proliferation efforts and other issues, according to cybersecurity investigators. Using an

NSA targeted Chinese telecoms giant Huawei

men-in-black-clip-art_435830

The National Security Agency created “back doors” into networks maintained by the Chinese telecommunications company Huawei, according to a report released on Saturday. The report comes from a document provided by the former NSA contractor Edward Snowden and disclosed by

Shady world of industrial espionage

tosh 987982482

Tokyo – Japan vowed on Thursday to fight industrial espionage after domestic media reported technology and information from local companies, including chipmaker Toshiba, had been leaked to rivals from other countries. “Safeguarding Japan's cutting-edge technology and preventing leaks are extremely

US and China to discuss cybersecurity at high-level diplomatic meetings

obama-and-xi-jinping

The scourge of military and commercial hacking is to become the subject of high-level diplomatic talks between the US and China, in an apparent effort to end tension between Beijing and Washington over recent online attacks. The meetings, which will

Chinese Hackers Found U.S. Government Data on Google Servers

israeli-hackers-attack-ksa-uae

When Chinese hackers breached Google servers in 2010, they were not targeting the Gmail accounts of human rights activists, as the company claimed at the time. What the hackers were actually after was a database containing years of sensitive information

Lithuania threatened by cyber espionage

IMG_5434

Lithuania is experiencing increasing threats from cyber espionage and information attacks financed by foreign intelligence services, aiming to form a negative opinion about the country’s foreign policies and national defense, shows a report published by the government. The document, which

Chinese Military Group Linked to Hacks of More Than 100 Companies

CyberAttack_0204131-617x416

A large and complex hacker group connected to China’s military has been linked to hacks involving more than 100 companies in the U.S. and the theft of several hundreds of terabytes of data, according to a comprehensive report released Tuesday

Foreign hackers targeted former military chief Mullen

Image Credit: Chicago Tribune

WASHINGTON (Reuters) – Foreign hackers targeted the computers of Mike Mullen, ex-chairman of the Joint Chiefs of Staff, the Wall Street Journal reported on Wednesday, calling it the latest in a pattern of attacks on computers of former high-ranking U.S.