All the remaining Snowden documents will be released this month, according to whistle-blowing site Cryptome, which said in a tweet that the release of the info by unnamed third parties would be necessary to head off an unnamed "war".
Cryptome said it would "aid and abet" the release of "57K to 1.7M" new documents that had been "withheld for national security-public debate [sic]". The site clarified that will not be publishing the documents itself. Transparency activists would welcome such a release but such a move would be heavily criticised by intel experts and military officials, who argue the dump of intelligence documents have set intelligence efforts back years.
Read moreEvernote’s official discussion forum has suffered a security breach, which has allowed hackers to access user’s profile information and (in some cases) password hashes.
On Monday, Evernote‘s popular forum users became victims of a hacker attack. Hackers could get access to password hashes (this applies only to the users who created the passwords until 2011), names, birthday details and email addresses. “We do not store your Evernote password on our discussion forum servers and you do not need to change it,” Evernote representatives said. However, if you used the same account password on another sites you would need to change it.
Read moreTelephone numbers, dates of birth, addresses and names of not only mothers but also their infants were sold as well.
Employees of medical facilities in Toronto sold data on 8300 patients to commercial companies at Toronto's Rouge Valley Hospital from 2010 to 2014. As Zecurion Analytics representatives reported the data belonged to young mothers, while staying at the hospital. Moreover, addresses, telephone numbers, dates of birth, names of not only patients, but also their infants were sold. As for the buyers they were commercial companies that provide "services for the management of savings accounts for children's education (RESP- accounts)."
Read moreThe forum of AVAST, one of the world largest companies producing antivirus software is currently offline and will remain so for a brief period. It was hacked over this past weekend and user nicknames, user names, email addresses and hashed (one-way encrypted) passwords were compromised.
Even though the passwords were hashed, it could be possible for a sophisticated thief to derive many of the passwords. If you use the same password and user names to log into any other sites, please change those passwords immediately. Once our forum is back online, all users will be required to set new passwords as the compromised passwords will no longer work.
Read moreiOS users in Russia began to face attacks by hackers who steal passwords to block smartphones and tablets and extort money for their unlock. To prevent this, you need to make your passwords long and complex, and not to impose them on suspicious sites, "Kaspersky Lab" recommends.
The exact number of hacked phones is unknown. The representatives of Apple declined to comment.
The attackers use the fact that in the new version of iOS 7 has become possible to block stolen smartphone that cannot be removed with help of a reset or flashing devices. If you want to use this feature, you must know the user‘s name (Apple ID, also known as e-mail address) and password.
Apple has the technical ability to disclose a wide range of information about a user upon the request of the authorities – from the person’s name and contact information to their photos and e-mail content.
This refers to the new company policy of cooperation with the law enforcement agencies. If there is a valid search warrant and the serial number of the iPhone, iPod touch or iPad the Cupertino-based company may extract some types of data, even if the device has a password.
In particular, this refers to the user files created with proprietary applications. These include SMS-messages, photos, videos, contacts, and call history records. In case if the iOS-device is password-protected, the Apple cannot disclose the contents of the e-mail, calendar plans or the data of the third party applications.
Read moreCompany says it had the right to crack open the Hotmail account of an unnamed blogger as an investigation measure in Windows 8 espionage case, because he was selling Windows Server activation keys.
Such an invasion of privacy by accessing Hotmail correspondence Microsoft called an “exceptional" step.
“Limited review” of the blogger’s mail account, whose name is kept secret, was a part of an investigation of a larger espionage case against Windows and had proved blogger illegally selling Microsoft IP. The unnamed blogger (from France) had been provided Windows 8 RT source code by Alex Kibalko, Microsoft's employee by then.
Read moreArbor Networks today published the results of its survey revealing that over a third of businesses (38%) still have no incident response plan.
The Economist Intelligence Unit surveyed 360 senior executives, with 73% of these being C-level management or board members from across the world, with 31% based in North America, 36% in Europe and 29% in Asia-Pacific.
The report shows that from 77% of companies, effected by some kind of data loss incident in the last two years, over a third of them (38%) still have no incident response plans in place.
Read moreThe phone numbers and usernames of more than 4.6 million North American Snapchat users have been leaked online. SnapchatDB, an unofficial site run by an anonymous individual or group, allows open access to two files — one an SQL dump, one CSV text — that show details of the photo-sharing app's users alongside their location.
The final two digits of phone numbers have been censored "to minimize spam and abuse," but SnapchatDB says people should "feel free" to contact it for the uncensored database, as it may release it under certain circumstances. Usernames are presented unedited, and SnapchatDB notes that "people tend to use the same username around the web."
Read moreWhat would a former Gitmo detainee, a journalist in a small central Asian newspaper and an editor of a big Western publication have in common? They are provided with documents from WikiLeaks about politics in the region, but what will they do with them?
For a former Gitmo detainee, the documents reveal a bit about why he was captured – for knowing more about the movements of refugees in the area, information that he says “everybody knows.” But for editors in Central Asian capitals, WikiLeaks files are a hot potato. The documentary film dates back to 2011, when WikiLeaks activists were just starting to realize the power of the leaked US cables they had received from whistleblower Bradley (Chelsea) Manning.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland