SafeUM
Home Blog Services Download Help About Recharge

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
Archive
#NSA
2 Nov 2016

Hackers say they’re revealing more from trove of NSA data

A group calling itself “Shadow Brokers” says it has released another gem from its trove of high-level hacking tools stolen from the U.S.’s National Security Agency, potentially offering added insight into how America’s spies operate online.

The leak discloses NSA-style codenames and carries internet protocol information about scores of organizations, many based in Japan, China and South Korea. Matthew Hickey, co-founder of UK-based cybersecurity consultancy Hacker House, said it was plausible that the servers would have seen use as staging posts to help obfuscate the origin of electronic eavesdropping operations.

Read more
Tags:
hackers NSA USA information leaks
Source:
The Washington Post
1908
23 Sep 2016

Probe of leaked US NSA hacking tools examines operative's mistake

A US investigation into a leak of hacking tools used by the National Security Agency is focusing on a theory that one of its operatives carelessly left them available on a remote computer and Russian hackers found them, four people with direct knowledge of the probe told.

The tools, which enable hackers to exploit software flaws in computer and communications systems from vendors such as Cisco Systems and Fortinet Inc, were dumped onto public websites last month by a group calling itself Shadow Brokers. One reason for suspecting government instead of criminal involvement, officials said, is that the hackers revealed the NSA tools rather than immediately selling them. 

Read more
Tags:
NSA USA information leaks
Source:
Reuters
1833
21 Sep 2016

Cisco finds new zero-day exploit linked to NSA hackers

Network equipment vendor Cisco is finally warning its customers of another zero-day vulnerability the company discovered in the trove of NSA's hacking exploits and implants leaked by the group calling itself "The Shadow Brokers."

Last month, the Shadow Brokers published firewall exploits, implants, and hacking tools allegedly stolen from the NSA's Equation Group, which was designed to target major vendors including, Cisco, Juniper, and Fortinet. Cisco analyzed the exploit and noted that it had not identified any new flaws related to this exploit in its current products.

Read more
Tags:
NSA Cisco hackers information leaks
Source:
The Hacker News
2475
19 Sep 2016

Congressional report slams NSA leaker Edward Snowden

A House intelligence committee report condemned Edward Snowden, saying the National Security Agency leaker is not a whistleblower and that the vast majority of the documents he stole were defense secrets that had nothing to do with privacy.

The Republican-led committee released a three-page unclassified summary of its two-year bipartisan examination of how Snowden was able to remove more than 1.5 million classified documents from secure NSA networks, what the documents contained and the damage their removal caused to US national security. Snowden was an NSA contract employee when he leaked the documents to journalists.

Read more
Tags:
surveillance NSA USA Snowden information leaks
Source:
Associated Press
2357
7 Sep 2016

New leaked files reveal more about NSA satellite eavesdropping

Leaks by NSA whistleblower Edward Snowden have revealed how his former employer used the US spy base at Menwith Hill in Yorkshire to conduct ‘kill or capture’ missions in its global shadow war.

The new files published by the Intercept partly lay to rest speculation by journalists and campaigners over what really goes on at the US base. They show that secretive NSA kill-capture operations in the Middle East have been developed and initiated from inside the base’s heavily guarded perimeter wire. The programs, which carry names like GHOSTWOLF and GHOSTHUNTER, have been used to support conventional operations in war zones.

Read more
Tags:
surveillance USA NSA
Source:
Russia Today
1956
22 Aug 2016

The NSA leak is real, Snowden documents confirm

A hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA.

Based on documents provided by Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide. The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.

Read more
Tags:
surveillance NSA USA Snowden information leaks
Source:
The Intercept
2600
16 Aug 2016

NSA's hacking group hacked! Bunch of private hacking tools leaked online

A mysterious hacker or hackers going by the name “The Shadow Brokers” claims to have hacked a group linked to the NSA and dumped a bunch of its hacking tools. In a bizarre twist, the hackers are also asking for 1 million bitcoin in an auction to release more files.

The hackers referred to their victims as the Equation Group, a codename for a government hacking group widely believed to be the NSA. The security firm Kaspersky Lab unmasked Equation Group in 2015, billing it as the most advanced hacking group Kaspersky researchers had ever seen. The Shadow Brokers claimed to have hacked the Equation Group and stolen some of its hacking tools.

Read more
Tags:
hackers information leaks USA NSA surveillance
Source:
Motherboard
2065
12 Aug 2016

This is what the world's spies used instead of MSN messenger

What do spies use to chat online? A terribly ugly Windows programme. At least, that's what the Five Eyes intelligence alliance was using back in 2003, according to a newly released Snowden document.

“The Five-Eyes SIGINT [signals intelligence] Directors will soon be using a new tool to enhance their collaboration on subjects ranging from current intelligence objectives to future collection planning,” reads an issue of SID Today, the NSA's internal newsletter, dating from September 2003. InfoWorkSpace, as the tool is called, allowed text chat, audio conferencing, shared screen views, and virtual whiteboards, the newsletter explains.

Read more
Tags:
Snowden surveillance NSA USA
Source:
Motherboard
2210
13 Jun 2016

NSA looking to exploit Internet of Things, including biomedical devices

The national security agency is researching opportunities to collect foreign intelligence — including the possibility of exploiting internet-connected biomedical devices like pacemakers, according to a senior official.

“We’re looking at it sort of theoretically from a research point of view right now,” Richard Ledgett, the NSA’s deputy director, said at a conference on military technology at Washington’s Newseum. Biomedical devices could be a new source of information for the NSA’s data hoards — “maybe a niche kind of thing … a tool in the toolbox,” he said, though he added that there are easier ways to keep track of overseas terrorists and foreign intelligence agents.

Read more
Tags:
USA NSA surveillance Internet of Things trends
Source:
The Intercept
1995
18 May 2016

The Intercept is broadening access to the Snowden archive

From the time we began reporting on the archive provided to us in Hong Kong by NSA whistleblower Edward Snowden, we sought to fulfil his two principal requests for how the materials should be handled.

They should be released in conjunction with careful reporting that puts the documents in context and makes them digestible to the public, and that the welfare and reputations of innocent people should be safeguarded. As time has gone on, The Intercept has sought out new ways to get documents from the archive into the hands of the public, consistent with the public interest as originally conceived.

Read more
Tags:
surveillance Snowden NSA USA
Source:
The Intercept
2396
SafeUM NEWS
27 Apr 2017 safeum news imgage Encrypted Group Chat
4 Apr 2017 safeum news imgage Each SafeUM user gets free anonymous phone number
10 Mar 2017 safeum news imgage SafeUM useful features to help you feel safe
28 Sep 2016 safeum news imgage Secure Messenger SafeUM
21 Jul 2015 safeum news imgage New secured zone of Google Play: secure messenger SafeUM for Android. Download, Install, Communicate
3 Apr 2015 safeum news imgage We are beginning to test SafeUM for Windows Phone
25 Feb 2015 safeum news imgage SafeUM messenger is available for public testing
20 Feb 2015 safeum news imgage Algorithms and encryption schemes used for secure messenger SafeUM
30 Jan 2015 safeum news imgage New "TOP Security!" app is on the App Store
22 Jan 2015 safeum news imgage Free "TOP Security!" app is available on Google Play
28 Oct 2014 safeum news imgage How are security keys generated in SafeUM?
19 Jun 2014 safeum news imgage SafeUM is the best messenger for data protection and information security
16 Jun 2014 safeum news imgage Become a SafeUM tester and get free PREMIUM subscription for a year
12 May 2014 safeum news imgage Why Premium secure messenger SafeUM cannot be free
25 Apr 2014 safeum news imgage Encrypted secure messaging for every mobile device
All news
First page Previous
1 2 3 4 5 . . 27
Next Last page
SafeUM
Confidential Terms of Use Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015