Tag Archives: NSA

New Android Ransomware from the NSA?

There is new ransomware floating around that encrypts the contents of Android phones called Simlocker. It pretends to be from the NSA, uses XMPP (Extensible Messaging and Presence Protocol) and is hard to detect with anti-malware tools. Check Point’s malware … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on New Android Ransomware from the NSA?

NSA’s XKeyscore

The NSA has their own version of Google. It collects, supposedly, way more information than the search giant. The NSA system pulls in countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on NSA’s XKeyscore

NSA Wants Access to Encrypted Data Too!

The director of the U.S. National Security Agency, Michael Rogers, wants access to encrypted data on computers and other devices. He’s working on developing a framework that will enhance investigations. This functionality should be enabled by software manufacturers, but hopefully … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on NSA Wants Access to Encrypted Data Too!

Gemalto and the Great Sim Encryption Key Theft

Edward Snowden leaked via the Intercept, The National Security Agency (NSA) and the Government Communications Headquarters (GCHQ) jointly hacked into the internal network of the largest Subscriber Identity Module (SIM) card creator and manufacturer, who also puts the chips into … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Gemalto and the Great Sim Encryption Key Theft

The Equation Group

Possibly around 1996, but more actively in 2001, the Equation Group has been doing some really hardcore hacking on targets throughout the world. Their methods are far up the supply chain, as they would intercept and infect CDs and other … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on The Equation Group

Edward Snowden on Ted: Here’s How to Take Back the Internet

Makes you think differently about this bottle top. Read it from the perspective of the normal person, read it from the perspective of Edward Snowden, then read it from the perspective of the NSA.

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Edward Snowden on Ted: Here’s How to Take Back the Internet

TOR Mail

I’m sure people used TOR Mail because they thought they were completely anonymous. But there are side channel attacks, like asking France for a particular server.

Posted in Security Blog | Tagged , , , , | Comments Off on TOR Mail

Mikko Hypponen: How NSA Ruined Our Trust

Airgap, blackpearl, cineplex, xkeyscore, prism, creek, crossbones, cultweave, cybertrans, dishfire, doublearrow, dragonfly, wealthycluster, hightide, skywriter, jollyroger, kingfish, liquidfire, messiah, nightsurf, normalrun, mailorder, pinwale, taperlay, tarotcard, twistedpath, yellowstone. If you have nothing to hide, can you be trusted with secrets? How … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Mikko Hypponen: How NSA Ruined Our Trust

Jim Miklaszewski

Saw this meme on Imgur. Is it just a meme? Did this happen? I don’t know.

Posted in Security Blog | Tagged , , , , | Comments Off on Jim Miklaszewski