SafeUM
Home Blog Services Download Help About Recharge

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
Archive
# China
23 Feb 2015

Lenovo is accused of installing adware on new PCs

Lenovo, the largest PC manufacturer in world, has been accused of fatally compromising user security by installing an adware application on all its Windows computers as they leave the factory.

The software purports to offer users a “visual search” experience. In actual fact, it injects third-party advertisements into Google search results and websites, without asking the user. In order to place adverts on websites served to the user over an encrypted connection, as Google does by default, Lenovo owners report that Superfish software also breaks social security used by every computer to access the internet privately.

Read more
Tags:
Lenovo China information leaks malvertising Superfish
Source:
The Guardian
2816
11 Feb 2015

Hackers attack Forbes website

Chinese hackers attacked Forbes.com and used the site as part of an attack on the US defense and financial industry, according to cybersecurity researchers at iSIGHT Partners and Invincea.

For three days late last year, the news site's “Thought of the Day” widget, which appears when readers visit the site, was compromised — seamlessly redirecting visitors from certain organizations to another site where their computers could be infected with malware without their knowledge. Researches have linked similar malware controlled by the same server used in the Forbes attack to breaches of Web sites frequented by domestic Chinese dissident groups.

Read more
Tags:
hackers surveillance China Forbes
Source:
The Washington Post
2141
22 Jan 2015

China reportedly attacks Microsoft users

China mounted a cyberattack on users of Microsoft's Outlook email service, with the apparent goal of spying on their communications. People within China using email clients to connect to their Outlook, Hotmail or Live accounts were subjected to a "man-in-the-middle" attack in which the attacker tried to hijack what's normally a secure, encrypted connection.

The activist group believes this is the latest attempt by China to intercept and spy on communications that it can't easily monitor. Some users reported the attack when they saw error messages using email clients connecting to Outlook's servers via IMAP and SMTP, protocols used to send and receive emails.

Read more
Tags:
hackers China MITM Microsoft
Source:
Mashable
2133
12 Jan 2015

China buys Trojans to spy on smartphones

The police department of the Chinese city of Wenzhou in southeast China has spent thousands of dollars on a software that installs Trojan horse viruses into mobile phones, allowing police officers to spy on other people's activities on their phones.

Investigative reporter first made the report when he posted on his Sina Weibo page a screenshot of a list of devices that were purchased by the Wenzhou police force and posted on the website of the Wenzhou Economic Technology Department Zone in Zheijiang province. The list includes a lot of Trojan horse viruses for mobile phones and a device that injects the virus into illegally unlocked iOS and Android phones. 

Read more
Tags:
Trojan surveillance China iOS Android
Source:
Tech Times
1918
26 Dec 2014

Leak of online ticketing data scares public

A leak of personal information from online train ticket sales during the busiest time of year has spurred public outcry over Internet vulnerability. A trove of personal data used for buying tickets on the official ticket-selling website is circulating on the Internet. The leaked information includes usernames, passwords and emails.

As China's Lunar New Year approaches, a big number of people have resorted to the internet as the fastest way to purchase tickets in the lead up to the Chunyun, the hectic travel period surrounding the Chinese New Year. The ticket rush has also led to the birth of software and web browsers that allow passengers to cut ahead of others when snapping up online tickets.

Read more
Tags:
information leaks China
Source:
Chinadaily
1894
22 Dec 2014

Apple failing to protect Chinese factory workers

Poor treatment of workers in Chinese factories which make Apple products has been discovered by an undercover Panorama investigation. Filming on an iPhone 6 production line showed Apple's promises to protect workers were routinely broken.

It found standards on workers' hours, ID cards, dormitories, work meetings and juvenile workers were being breached at the Pegatron factories. Apple said it strongly disagreed with the programme's conclusions. Exhausted workers were filmed falling asleep on their 12-hour shifts at the Pegatron factories on the outskirts of Shanghai. One undercover reporter had to work 18 days in a row despite repeated requests for a day off. 

Read more
Tags:
Apple China trends
Source:
BBC News
7126
8 Dec 2014

Russian hackers identified as most skilled

UK cyber security professionals have identified Russia and China as the countries that produce the most skilled hackers, according to a survey carried out by information security consultancy. A lot of people believed that the hackers with the highest skills come from Russia.

Almost a third of respondents surveyed at a recent IT conference linked the success of their overseas counterparts to a combination of more investment, better education and political motivations. Russia has long been recognised for being behind various malware strains and exploits. Recently, it was reported that Russian hackers had exploited a bug in Microsoft Windows dubbed Sandworm to perform cyber espionage on NATO.

Read more
Tags:
Russia United Kingdom hackers China
Source:
MWR InfoSecurity
2050
8 Dec 2014

DeathRing, a new Pre-loaded mobile trojan in the wild

The number of Pre-loaded mobile trojan in the wild is increasing, DeathRing is the last one discovered by the experts. It’s not first the time that Android handsets come preloaded with malware, but cyber security experts are warning of a worrying increase of the cases.

The problem is widespread in Asia and Africa, where criminals are able to compromise the supply chain. Similar cases are frequent for a cheap, low-level devices. Security researchers have detected pre-loaded instances of the DeathRing malware, unfortunately they are not currently aware of where in the supply chain the mobile trojan is installed.

Read more
Tags:
Android China DeathRing information leaks Trojan
Source:
Security Affairs
2027
13 Nov 2014

Chinese hack weather systems of the USA

Hackers from China breached the federal weather network recently, forcing cybersecurity teams to seal off data vital to disaster planning, aviation, shipping and scores of other crucial uses, officials said. NOAA did not say its systems were compromised.

Officials also said that the agency did not notify the proper authorities when it learned of the attack. NOAA officials declined to discuss the suspected source of the attack, whether it affected classified data and the delay in notification. Determining the origin of cyber­attacks is very difficult and Chinese officials have denied repeated accusations that they intrude in U.S. government computer systems for espionage or other purposes.

Read more
Tags:
USA NOAA China hackers trends
Source:
The Washington Post
2318
13 Nov 2014

Hong Kong sites hit by 111% rise in DDoS attacks

Distributed Denial of Service attacks against Hong Kong websites increased a whopping 111% as pro-democracy protests in the Special Administrative Region of China took hold. Data demonstrating a striking correlation between real-world and online conflict was examined.

While establishing definitive causal relationships and attribution is tricky, DDoS attacks appear to have become the “new normal” in countries experiencing political unrest. Additionally, large-scale DDoS attacks were observed targeting Hong Kong-related internet properties that coincide with reports of debilitating disruptions of online media outlets sympathetic to the protest movement.

Read more
Tags:
DDoS information leaks China
Source:
Infosecurity
1883
SafeUM NEWS
27 Apr 2017 safeum news imgage Encrypted Group Chat
4 Apr 2017 safeum news imgage Each SafeUM user gets free anonymous phone number
10 Mar 2017 safeum news imgage SafeUM useful features to help you feel safe
28 Sep 2016 safeum news imgage Secure Messenger SafeUM
21 Jul 2015 safeum news imgage New secured zone of Google Play: secure messenger SafeUM for Android. Download, Install, Communicate
3 Apr 2015 safeum news imgage We are beginning to test SafeUM for Windows Phone
25 Feb 2015 safeum news imgage SafeUM messenger is available for public testing
20 Feb 2015 safeum news imgage Algorithms and encryption schemes used for secure messenger SafeUM
30 Jan 2015 safeum news imgage New "TOP Security!" app is on the App Store
22 Jan 2015 safeum news imgage Free "TOP Security!" app is available on Google Play
28 Oct 2014 safeum news imgage How are security keys generated in SafeUM?
19 Jun 2014 safeum news imgage SafeUM is the best messenger for data protection and information security
16 Jun 2014 safeum news imgage Become a SafeUM tester and get free PREMIUM subscription for a year
12 May 2014 safeum news imgage Why Premium secure messenger SafeUM cannot be free
25 Apr 2014 safeum news imgage Encrypted secure messaging for every mobile device
All news
First page Previous
1 2 3 4 5
Next Last page
SafeUM
Confidential Terms of Use Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015