Experts recently obtained an hour-long audio recording from an internal briefing at Apple titled “Stopping Leakers - Keeping Confidential at Apple.”
The presentation was led by three members of Apple’s Global Security division: director of global security David Rice, director of worldwide investigations Lee Freedman, and Jenny Hubbert, from the Global Security communications and training team. The audio describes the lengths Apple goes to in order to keep information about new products out of the hands of leakers. The Global Security team tasked with this includes previous members from the NSA, the US military, the FBI, and the US Secret Service.
Read moreThe NSA — the United States intelligence agency which is known for its secrecy and working in the dark — has finally joined GitHub and launched an official GitHub page.
The NSA employs genius-level coders and brightest mathematicians, who continually work to break codes, gather intelligence on everyone, and develop hacking tools like EternalBlue that was leaked by the Shadow Brokers in April and abused by the WannaCry ransomware last month to wreak havoc worldwide. The intelligence agency mostly works in secret, but after Edward Snowden leaks in 2013, the NSA has started opening itself to the world.
Read moreA data analytics contractor employed by the Republican National Committee left databases containing information on nearly 200 million potential voters exposed to the internet without security, allowing anyone who knew where to look to download it without a password.
"We take full responsibility for this situation," said the contractor, Deep Root Analytics, in a statement. The databases were part of 25 terabytes of files contained in an Amazon cloud account that could be browsed without logging in. The account was discovered by researcher Chris Vickery of the security firm UpGuard. The files have since been secured.
Read moreA 25-year-old broke into a DoD satellite communication system and doxed around 800 Department of Defense employees. A British man has pleaded guilty to hacking into a US Department of Defense system stealing data from around 30,000 satellite phones.
Sean Caffrey, a 25-year-old from the outskirts of Birmingham, admitted to breaking into a US military communications system on June 15, 2014, stealing "hundreds of user accounts." The hacker stole "ranks, usernames and email addresses of more than 800 users of a satellite communications system, as well as of about 30,000 satellite phones," according to NCA.
Read moreHow would you like to chuck the boarding pass and ID flash at the airport for your fingerprint?
The Transportation Security Administration said it's testing a new checkpoint screening technology that matches fingerprints provided at the checkpoint with those already on file for travelers enrolled in the agency's PreCheck program. The program allows low-risk travelers to go through expedited screening instead of waiting in regular security lines. The TSA said the technology has the potential to automate the check-in process by eliminating the need to check passengers' boarding passes and identification.
Read moreApple is one of the largest tech companies in the United States that have been involved in user spying scandals, with many accusing the firm of working with the government on snooping on customers and providing law enforcement with access to their data.
Cupertino, on the other hand, has actually claimed to be doing otherwise, fighting against the government on several occasions, including in early 2016 when it refused to hack a locked iPhone that was allegedly used by one of the San Bernardino terrorists. This time, Apple's name is involved in new snooping claims in regard to the terrorist attacks that took place in the United Kingdom in the last few weeks.
Read moreOn May 24, Chris Vickery, a cyber risk analyst with the security firm UpGuard, discovered a publicly accessible data cache on Amazon Web Services' S3 storage service that contained highly classified intelligence data. The cache was posted to an account linked to defense and intelligence contractor Booz Allen Hamilton.
And the files within were connected to the US National Geospatial-Intelligence Agency (NGA), the US military's provider of battlefield satellite and drone surveillance imagery. Based on domain-registration data tied to the servers linked to the S3 "bucket," the data was apparently tied to Booz Allen and another contractor, Metronome.
Read moreIf the NSA's leaked hacking tools had a Voltron, it would be EternalRocks. On Sunday, researchers confirmed new malware, named EternalRocks, that uses seven exploits first discovered by the National Security Agency and leaked in April by the Shadow Brokers group. Experts described the malware as a "doomsday" worm that could strike suddenly.
Earlier this month, the WannaCry ransomware plagued hospitals, schools and offices around the world and spread to more than 300,000 computers. It uses two NSA exploits that were leaked by the Shadow Brokers, EternalBlue and DoublePulsar.
Read moreThe hacking group that says data they released facilitated the WannaCry ransomware attack has threatened to leak a new wave of hacking tools they claim to have stolen from the US National Security Agency.
The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.
Read moreRussia’s growing aggression toward the United States has deepened concerns among U.S. officials that Russian spies might try to exploit one of the world’s most respected cybersecurity firms to snoop on Americans or sabotage key U.S. systems.
Products from the company, Kaspersky Lab, based in Moscow, are widely used in homes, businesses and government agencies throughout the United States, including the Bureau of Prisons. Kaspersky Lab’s products are stocked on the shelves of Target and Best Buy, which also sells laptops loaded by manufacturers with the firm’s anti-virus software.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland