SafeUM
Home Blog Services Download Help About Recharge

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
Archive
#Russia
29 Oct 2014

A malicious Tor exit node was found in Russia

Tor exit node in Russia spotted downloading malicious code. Users of the Tor network now have one more reason to be cautious when using the service to browse the Internet or to download executable code anonymously.

A security researcher uncovered a malicious Tor exit node in Russia being used by unknown attackers to insert malicious code into files being downloaded by Tor users. Tor administrators have since flagged the node as a BadExit, meaning that Tor clients now know to avoid using the server. Tor is a network that allows users to browse the web anonymously. It uses a series of encrypted connections to route data packets in such a manner as to hide the true IP address of the person using the service. 

Read more
Tags:
Tor information leaks Russia fraud
Source:
Dark Reading
2797
29 Oct 2014

Russian hackers accused of targeting NATO

The security firm of the USA has claimed that a sophisticated, Russia-based hacker group is spying on NATO and former Soviet member states, most likely on the orders of the Russian government. 

Russian cyber espionage efforts have long been considered unrivaled in skill and scope, but the difficulty of identifying attacks and tracing them to an identifiable source has prevented cyber security investigators from pinning any activity directly on a single Russian entity. But evidence of a wide-ranging cyber espionage campaign is mounting. Earlier a group of Russian hackers with suspected government backing had used a previously unknown backdoor.

Read more
Tags:
NATO USA Russia hackers information leaks FireEye
Source:
The Moscow Times
2075
22 Oct 2014

Chechen leader (Russia) Ramzan Kadyrov offered Russia to be without foreign messengers

Using Skype, Twitter and other western services harms the security of the country, says the head of Chechnya. Chechen leader Ramzan Kadyrov said that the spread of western communication services on the Internet harms national security.

Their use encourages the ongoing double standards west policy, Kadyrov said. He considers situation to be unacceptable in which the West controls Russian users, and Russia is far from the steering information. The main problem is lack of control. Kadyrov also offered to turn off the Internet, as a global network, in his opinion, interfere with the proper education of youth.

Read more
Tags:
trends messengers Russia Twitter Skype
Source:
ТАСС
2221
14 Oct 2014

Russian Sandworm Hack Has Been Spying on Foreign Governments

A cyberespionage campaign believed to be based in Russia has been targeting government leaders and institutions for nearly five years, according to researchers with iSight Partners who have examined code used in the attacks.

The campaign, dubbed “Sandworm” is believed to have been running since 2009, and used a wide-reaching zero-day exploit uncovered by the researchers that affects nearly every version of the Windows operating system released since Windows Vista. The attackers also targeted attendees of this year’s GlobSec conference, a high-level national security gathering that attracts foreign ministers and other top leaders.

Read more
Tags:
Sandworm hackers NATO USA Russia PowerPoint
Source:
Wired
2760
29 Aug 2014

Experts have found vulnerability in Yo

Russian hackers were able to get access to the accounts of many users. Alexander Grebenshikov and Leo Loktionov, information security specialists told about the presence of a dangerous gap in the Yo messenger.

Experts said that if you update the account login application, the system sends a confirmation code to the mobile number by default, without making sure that it really belongs to the owner of the account. Information security experts explained that on the Yo Password Reset page, one may write any user‘s name and get a link to change the password, by using and entering your own phone number. Alexander Grebenshikov noticed this kind of vulnerability, while Leo Loktionov found a way with the help of which one may get account using the panel of service creators. 

Read more
Tags:
Yo information leaks hackers Russia
Source:
SafeUM
1991
28 Aug 2014

FBI suspects Russian hackers of data theft from JPMorgan

The FBI is investigating an incident of data theft from JPMorgan Chase & Co. (JPM) that could potentially have been carried out by Russian hackers, Bloomberg reported Thursday, citing sources familiar with the situation.

“The way the Russians do it, to the extent we can see into the process, is they encourage certain targets,” James Lewis, the director of the Strategic Technologies program at the Center for Strategic and International Studies in Washington, was quoted as saying by Bloomberg. “The Russians typically keep open the options to do something more, and the question now is what would trigger that and what would our response be,” he added. 

Read more
Tags:
Russia fraud hackers
Source:
RIA
2238
24 Jul 2014

Russia reward bonuses looking to crack the encryption network solutions anonymous

Russia is to crack the Tor anonymity network out of high reward. According to British media reports, offering a reward of 3.9 million Russian rubles (about 680,000 yuan), hoping to find crack Tor anonymity network called the program.

The anonymous network hides the user's location and identity, let them through computers on the network to upload a lot of data, and the program is encrypted. Russia's Interior Ministry made this reward decision and said it was to 'ensure the country's defense and security.' This award rule only applies to the Russian people; the program submission deadline is August 13. Applicants need to pay 19.5 million rubles (about 34,000 yuan), to participate in competitions.

Read more
Tags:
Russia Tor surveillance
Source:
Newshome
1927
20 Jun 2014

Russians declared readiness to open personal data on the Internet

Authors of "Confidential Index" research from the EMC Company told about number of Russians who are ready to open personal information for convenience. About 38 percent of Russians are ready to open the personal information for convenience of work on the Internet whereas in the world this indicator makes only 27 percent.

About it it is spoken in EMC corporation research. To medical institutions and medical insurance companies we are ready to entrust the personal information about 39 percent of Russians, to banking and other financial institutions ─ 42 percent. It is interesting that the world indicator of trust of personal information to medical institutions makes nearly 50 percent. 

Read more
Tags:
Russia data protection
Source:
Russian News
1893
18 Jun 2014

Access into iCloud without Apple ID password

Moscow-based Elcomsoft has developed a new version of Phone Password Breaker 3.0 program with access into iCloud without Apple ID and the password function.

But this feature is mostly intended for our law enforcement and forensic customers, as using a password-free entry into iCloud requires a binary authentication token that must be extracted from the suspect’s computer (OS X or Windows). But you’ll still need the suspect’s PC with iCloud Control Panel installed which has iCloud Control Panel installed. Moreover the user must’ve been logged in to iCloud Control Panel on that PC at the time the computer is seized. If the user logged out of the Panel, the authentication tokens are then deleted.

Read more
Tags:
Russia Apple surveillance
Source:
Хаkер
4176
9 Jun 2014

The Russian computer program passed Turing test

A computer program made in Russia became the first in the history that managed to pass Turing test which was developed in 1950 in order to determine how machine‘s intelligence can imitate the human‘s one.

The program was created by Russian engineer Vladimir Veselov and Ukrainian Eugene Demchenko. A computer program has managed to convince judges it was a 13-year-old boy Eugene Goostman from Odessa. The Turing Test is based on 20th century mathematician and code-breaker Alan Turing's question and answer game set out in his 1950 paper ‘Computing Machinery and Intelligence’. During the tests the machine has to convince the person by means of correspondence that it is a person, instead of artificial intelligence.

Read more
Tags:
Russia trends
Source:
The Guardian
2107
SafeUM NEWS
27 Apr 2017 safeum news imgage Encrypted Group Chat
4 Apr 2017 safeum news imgage Each SafeUM user gets free anonymous phone number
10 Mar 2017 safeum news imgage SafeUM useful features to help you feel safe
28 Sep 2016 safeum news imgage Secure Messenger SafeUM
21 Jul 2015 safeum news imgage New secured zone of Google Play: secure messenger SafeUM for Android. Download, Install, Communicate
3 Apr 2015 safeum news imgage We are beginning to test SafeUM for Windows Phone
25 Feb 2015 safeum news imgage SafeUM messenger is available for public testing
20 Feb 2015 safeum news imgage Algorithms and encryption schemes used for secure messenger SafeUM
30 Jan 2015 safeum news imgage New "TOP Security!" app is on the App Store
22 Jan 2015 safeum news imgage Free "TOP Security!" app is available on Google Play
28 Oct 2014 safeum news imgage How are security keys generated in SafeUM?
19 Jun 2014 safeum news imgage SafeUM is the best messenger for data protection and information security
16 Jun 2014 safeum news imgage Become a SafeUM tester and get free PREMIUM subscription for a year
12 May 2014 safeum news imgage Why Premium secure messenger SafeUM cannot be free
25 Apr 2014 safeum news imgage Encrypted secure messaging for every mobile device
All news
First page Previous
1 2 3 4 5 6
Next Last page
SafeUM
Confidential Terms of Use Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015