The chief executive of Russia's Kaspersky Lab says he's ready to have his company's source code examined by U.S. government officials to help dispel long-lingering suspicions about his company's ties to the Kremlin.
In an interview with The Associated Press at his Moscow headquarters, Eugene Kaspersky said Saturday that he's also ready to move part of his research work to the U.S. to help counter rumors that he said were first started more than two decades ago out of professional jealousy. "If the United States needs, we can disclose the source code," he said, adding that he was ready to testify before U.S. lawmakers as well.
Read moreExperts recently obtained an hour-long audio recording from an internal briefing at Apple titled “Stopping Leakers - Keeping Confidential at Apple.”
The presentation was led by three members of Apple’s Global Security division: director of global security David Rice, director of worldwide investigations Lee Freedman, and Jenny Hubbert, from the Global Security communications and training team. The audio describes the lengths Apple goes to in order to keep information about new products out of the hands of leakers. The Global Security team tasked with this includes previous members from the NSA, the US military, the FBI, and the US Secret Service.
Read moreHacking air-gapped machines — computers that are not connected to the internet, so theoretically less vulnerable — is always pretty interesting.
On Wednesday, Wikileaks published a series of alleged CIA documents that supposedly show how the intelligence agency's malware was designed to infect these sort of targets. Naturally, the documents indicate how the CIA has continued to develop its own hacking tools, allegedly targeting devices from smart TVs to internet routers. According to one of the documents, "Brutal Kangaroo is a tool suite for targeting closed networks by air gap jumping using thumbdrives."
Read moreThe NSA — the United States intelligence agency which is known for its secrecy and working in the dark — has finally joined GitHub and launched an official GitHub page.
The NSA employs genius-level coders and brightest mathematicians, who continually work to break codes, gather intelligence on everyone, and develop hacking tools like EternalBlue that was leaked by the Shadow Brokers in April and abused by the WannaCry ransomware last month to wreak havoc worldwide. The intelligence agency mostly works in secret, but after Edward Snowden leaks in 2013, the NSA has started opening itself to the world.
Read moreA data analytics contractor employed by the Republican National Committee left databases containing information on nearly 200 million potential voters exposed to the internet without security, allowing anyone who knew where to look to download it without a password.
"We take full responsibility for this situation," said the contractor, Deep Root Analytics, in a statement. The databases were part of 25 terabytes of files contained in an Amazon cloud account that could be browsed without logging in. The account was discovered by researcher Chris Vickery of the security firm UpGuard. The files have since been secured.
Read moreA 25-year-old broke into a DoD satellite communication system and doxed around 800 Department of Defense employees. A British man has pleaded guilty to hacking into a US Department of Defense system stealing data from around 30,000 satellite phones.
Sean Caffrey, a 25-year-old from the outskirts of Birmingham, admitted to breaking into a US military communications system on June 15, 2014, stealing "hundreds of user accounts." The hacker stole "ranks, usernames and email addresses of more than 800 users of a satellite communications system, as well as of about 30,000 satellite phones," according to NCA.
Read moreHow would you like to chuck the boarding pass and ID flash at the airport for your fingerprint?
The Transportation Security Administration said it's testing a new checkpoint screening technology that matches fingerprints provided at the checkpoint with those already on file for travelers enrolled in the agency's PreCheck program. The program allows low-risk travelers to go through expedited screening instead of waiting in regular security lines. The TSA said the technology has the potential to automate the check-in process by eliminating the need to check passengers' boarding passes and identification.
Read moreApple is one of the largest tech companies in the United States that have been involved in user spying scandals, with many accusing the firm of working with the government on snooping on customers and providing law enforcement with access to their data.
Cupertino, on the other hand, has actually claimed to be doing otherwise, fighting against the government on several occasions, including in early 2016 when it refused to hack a locked iPhone that was allegedly used by one of the San Bernardino terrorists. This time, Apple's name is involved in new snooping claims in regard to the terrorist attacks that took place in the United Kingdom in the last few weeks.
Read moreOn May 24, Chris Vickery, a cyber risk analyst with the security firm UpGuard, discovered a publicly accessible data cache on Amazon Web Services' S3 storage service that contained highly classified intelligence data. The cache was posted to an account linked to defense and intelligence contractor Booz Allen Hamilton.
And the files within were connected to the US National Geospatial-Intelligence Agency (NGA), the US military's provider of battlefield satellite and drone surveillance imagery. Based on domain-registration data tied to the servers linked to the S3 "bucket," the data was apparently tied to Booz Allen and another contractor, Metronome.
Read moreIf the NSA's leaked hacking tools had a Voltron, it would be EternalRocks. On Sunday, researchers confirmed new malware, named EternalRocks, that uses seven exploits first discovered by the National Security Agency and leaked in April by the Shadow Brokers group. Experts described the malware as a "doomsday" worm that could strike suddenly.
Earlier this month, the WannaCry ransomware plagued hospitals, schools and offices around the world and spread to more than 300,000 computers. It uses two NSA exploits that were leaked by the Shadow Brokers, EternalBlue and DoublePulsar.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland