SafeUM
Home Blog Services Download Help About Recharge

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
Archive
# FBI
31 Oct 2014

There is a second Edward Snowden in the USA

The FBI has reportedly raided the home of an "extremely principled and brave" whistleblower working for a contracting firm of the USA, thought to have been inspired by security contractor Edward Snowden to continue his work. 

The existence of a "second Snowden" was first suspected by authorities when information about the US government's master terrorist screening database surfaced online in August, months after Snowden had already fled the country. The government's frantic search for the new leaker intensified this month after scenes from Poitras' documentary on Snowden, Citizenfour, showed Greenwald appearing to confirm the existence of new whistleblower.

Read more
Tags:
Snowden FBI USA information leaks
Source:
Yahoo News
2168
27 Oct 2014

Android ransomware spreads itself via SMS

A new strain of Android ransomware is threatening the mobile industry, the new variant spreads itself via SMSs and holds the victim’s device phone hostage until a ransom is paid.

Implementing a classic extortion scheme locks the victim’s device display and then requests money from victims. The malware displays fake notifications from law enforcement agencies that accuse victims of viewing and storing child pornography. The security firm has already observed thousands of messages from hundreds of infected phones, mainly located in the USA. The attack scenario is very interesting, to spread itself, it first sends an SMS message to all contacts in the mobile’s address book with a text.

Read more
Tags:
Android information leaks Koler USA FBI
Source:
Security Affairs
2924
20 Oct 2014

Anonymous Whisper was accused of tracking users

One of the most popular application’s promise of anonymity while sharing secrets via its app rings less true today than it did last week about the app’s questionable tracking and use of user data. Among the revelations the messenger tracks the location of users who have opted out of geolocation services and has shared user data with the FBI.

 A number of unsavory things about how the company collects, tracks and shares user was datadiscovered. One of the most popular apps has created an in-house mapping tool that enables its employees to filter and search GPS data to location posters. The technology, for example, enables the company to monitor all the geolocated messages sent from the Pentagon.

Read more
Tags:
Whisper surveillance USA FBI
Source:
DIGITAL TRENDS
2392
13 Oct 2014

NSA used undercover agents in foreign companies

To infiltrate foreign networks and gain access to sensitive systems, the NSA has been using the tactics of “physical subversion” – deploying undercover agents in Chinese, German, South Korean and possibly even American companies.

Past reports on the National Security Agency have typically depicted a government organ that hacks other systems or works with private corporations to bypass their own encryption protections, but the latest report based on files leaked by Edward Snowden suggests the agency could be embedding operatives into foreign, as well as domestic, “commercial entities.”

Read more
Tags:
NSA FBI Germany China CIA наблюдение
Source:
Russia Today
2488
9 Oct 2014

Twitter sues the government of the USA

Twitter just sued the federal government over restrictions the government places on how much the company can disclose about surveillance requests it receives. For months, Twitter has tried to negotiate with the government to expand the kind of information that it and other companies are allowed to disclose. But it failed.

Twitter asserts in its suit that preventing the company from telling users how often the government submits national security requests for user data is a violation of the First Amendment. The move goes a step beyond a challenge filed by Google and other companies last year that also sought permission on First Amendment grounds to disclose how often it receives national security requests for data.

Read more
Tags:
USA sureillance Twitter PRISM FBI
Source:
WIRED
2214
24 Sep 2014

Fantastic technologies became real

The creation of Next Generation Identification system took a lot of years and money, but now it can change the old automated fingerprint identification, which was used by FBI. At the beginning the identification system was designed as multifactorial, because the data will be collected from different biometric indicators, and its functionality will be extended in future. 

The NGI system will have more data, than any systems have had before. In addition to fingerprints, tattoos and scars photos, images of the iris, the identification system will contain the pictures of people, namely the person identification as a form of available information source on biometric identification. 

Read more
Tags:
NGI FBI USA trends
Source:
SafeUM
1893
16 Sep 2014

How to protect yourself from cloud leaks

Not so long ago these news were marked by an internet-wide newsbreak: anonymous hackers somehow obtained explicit photos of various Hollywood celebrities, including many A-listers, like Jennifer Lawrence, and publicized this material on the Internet.

Such leaks are not new, however, this one was on a massive scale. From the very beginning there was an assumption that perhaps some photos were stolen directly from celebrities’ accounts in the Apple’s iCloud. Is this possible? If so, what can be done to avoid the theft? At this time, there is no hard evidence in this case. Apple and the FBI are currently investigating and we look forward to reading the results.

Read more
Tags:
iCloud FBI information leaks Google Apple
Source:
Kaspersky Daily
Author:
Alex Savitsky
2951
4 Sep 2014

Apple denies iCloud breach in celebrity nude photo hack

Apple says that the mass theft of nude celebrity photos that were released over the weekend did not occur because of a breach in any Apple systems, including iCloud.

Apple says, however, that certain celebrities were the subject of targeted hacking attempts that focused on compromising their usernames, passwords, and security questions. Though Apple's statement doesn't make it entirely clear, it sounds as though iCloud may still have been involved in the thefts in some capacity: that is, Apple's customers may have had their iCloud usernames and passwords stolen, giving another party access to their account.

Read more
Tags:
Apple information leaks FBI iCloud
Source:
The Verge
3121
9 May 2014

USA Federal Agencies want to secretly hack suspects' computers for criminal evidence

FBI can legally hack into suspects' computers for criminal evidence according to changes in the law on criminal liability in the United States.

The USA Justice Department (DOJ) is seeking a transition in the criminal rules that would make the authorities to have more leeway to secretly hack into the suspected criminals’ computer during criminal investigations at any times. According to the proposed change in the rules would make FBI to easily obtain warrants to secretly access suspects’ computers for the evidence when the physical location of the computer is not known to them. 

Read more
Tags:
USA surveillance FBI
Source:
The Hacker News
1958
7 May 2014

How extortionists block smartphones and what to do

Researchers have uncovered Android-based malware that disables infected handsets until end users pay a hefty cash payment to settle trumped-up criminal charges involving the viewing of illegal pornography.

To stoke maximum fear, Android-Trojan.Koler.A uses geolocation functions to tailor the warnings to whatever country a victim happens to reside in. The screenshot to the right invoking the FBI, for instance, is the notice that's displayed on infected phones connecting from a US-based IP address. People in Romania and other countries will see slightly different warnings. The malware prevents users from accessing the home screen of their phones, making it impossible to use most other apps installed on the phone. 

Read more
Tags:
surveillance Android FBI USA fraud
Source:
Ars Technica
2369
SafeUM NEWS
27 Apr 2017 safeum news imgage Encrypted Group Chat
4 Apr 2017 safeum news imgage Each SafeUM user gets free anonymous phone number
10 Mar 2017 safeum news imgage SafeUM useful features to help you feel safe
28 Sep 2016 safeum news imgage Secure Messenger SafeUM
21 Jul 2015 safeum news imgage New secured zone of Google Play: secure messenger SafeUM for Android. Download, Install, Communicate
3 Apr 2015 safeum news imgage We are beginning to test SafeUM for Windows Phone
25 Feb 2015 safeum news imgage SafeUM messenger is available for public testing
20 Feb 2015 safeum news imgage Algorithms and encryption schemes used for secure messenger SafeUM
30 Jan 2015 safeum news imgage New "TOP Security!" app is on the App Store
22 Jan 2015 safeum news imgage Free "TOP Security!" app is available on Google Play
28 Oct 2014 safeum news imgage How are security keys generated in SafeUM?
19 Jun 2014 safeum news imgage SafeUM is the best messenger for data protection and information security
16 Jun 2014 safeum news imgage Become a SafeUM tester and get free PREMIUM subscription for a year
12 May 2014 safeum news imgage Why Premium secure messenger SafeUM cannot be free
25 Apr 2014 safeum news imgage Encrypted secure messaging for every mobile device
All news
First page Previous
1 2 3 4 5 6 7
Next Last page
SafeUM
Confidential Terms of Use Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015