NSA inquiry head Patrick Sensburg claims communications technology mistrusted in wake of US spying allegations.
German politicians are considering a return to using manual typewriters for sensitive documents in the wake of the US surveillance scandal. The head of the Bundestag's parliamentary inquiry into NSA activity in Germany said in an interview with the Morgenmagazin TV program that he and his colleagues were seriously thinking of ditching email completely. Asked "Are you considering typewriters" by the interviewer on Monday night, the Christian Democrat politician Patrick Sensburg said: "As a matter of fact, we have – and not electronic models either".
Read moreHackers have enrooted harmful programs in computer, which steal personal information from guests.
Secret Service of the USA has found keyloggers in hotels and advised all heads of hotel and restaurant business to check personal computers, which visitors can use. To steal personal and bank information on visitors, malefactors enrooted malware, which remembers pressing of keys on the keyboard. Some people, suspected in compromising computers of many large hotels in Fort Worth and Dallas areas were arrested in Texas. Sometimes the suspects used stolen credit cards to register as guests of the hotels.
Read moreThe secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.”
The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call. The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive.
Read moreMass Media in China believes that iPhone‘s opportunity to track user‘s locations threatens national security.
If you turn on «Frequent Locations» function, then iPhone users can be tracked and information about them revealed. Then smartphone starts to accumulate information about the user. It means that in few days iPhone is able to learn a lot of things about user's private life, such as his working place, home address, his friends‘ location, shops and restaurants that user visits. Experts point out that this is sensitive data about user. If the data were accessed, it could reveal an entire country's economic situation and "even state secrets," the researcher said.
Read moreBefore the NSA gathered matadata, but now they gather calls. The former employee of the NSA William Binney reported that the agency traced almost all telephone conversations of citizens and nearly 80% of worldwide fiber-optical cables were passed through the territory of the USA.
It’s not surprising, because it allows the government to trace all entering communications. At least 80% of our calls and our personal data are recorded and stored in the USA while the NSA denies that they collect everything. The NSA main aim is to control the whole population completely. However decisions which were made by the Supreme Court recently encourage very much, for example, law enforcement are obliged to receive the warrant on access to user‘s personal data.
Read moreApple users accessing Gmail on mobile devices could be at risk of having their data intercepted, a mobile security company said Thursday.
The reason is Google has not yet implemented a security technology that would prevent attackers from viewing and modifying encrypted communications exchanged with the Web giant, wrote Avi Bashan, chief information security officer for Lacoon Mobile Security, based in Israel and the U.S. Websites use digital certificates to encrypt data traffic using the SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols. But in some instances, those certificates can be spoofed by attackers, allowing them to observe and decrypt the traffic. That threat can be eliminated through certificate “pinning”.
Read moreThe Department of Defense of the USA makes experiments on social networks users. Defense Advanced Research Projects Agency provides monitoring of microblog service and Internet users‘ posts on such large social networks as Facebook, Twitter, Pinterest and Kickstarter.
The Pentagon invests large amount of money for carrying out experiments which are connected with users‘ mood and its manipulation. Technological Department of Defence and scientists of university hold the Pentagon project, called Social Media in Strategic Communication. It provides monitoring of Twitter microblog service and Internet users‘ posts on large social networks.
Read moreGoogle Glass can take photos and tweet them with the power of thought. The app inventors claim that this is the first step to any device management with a thought.
Such application, called MindRDR allows to manage device without clicking and it can take photos with the power of thought. In certain version an additional analyzer, which can measure brainwaves is used. The device by itself transforms brainwaves into orders for electronic apparatus while the user is to concentrate on actions that he wants to do. The app creators believe that this program will allow Google Glass users to give commands in places where utter voice commands or clicking is uncomfortable.
Read moreIn Newcastle the 22-year-old computer science student Christopher Wilson was sentenced to 6 months coercive detention for not revealing the password that is required to decrypt the data on his computer.
He was urged to do this in “the interests of national security”. Wilson is accused of fooling police with cyber attack warnings as well as encouraging people to post deliberately inflammatory messages on a Facebook condolence page that was set up for two killed police officers. Wilson was already suspected to have sent rampage warning mails to the University of Newcastle. Two of these mails could be tracked back to Northumbria University where he was studying at that time.
Read moreBefore selling phone, we delete everything and use factory data reset that any smartphone has, but let’s take Android OS.
In fact everything is very easy, it is just necessary to press the button and all files are deleted, but it is true? AVAST engineers made an experiment in order to check whether personal user data could be recovered from phones. For this purpose the company purchased 20 used Android smartphones on eBay and then workers used widely available forensic software that can restore remote files. Results showed that factory data reset doesn’t guarantee full personal data removal.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland