Top

Tag: NSA

2017
16 Apr

In particular, one thing that perfectly ties Snowden’s latest documents with this toolkit is a note of tracking an exploit through a 16-character string (ace02468bdf13579) which happens to be found in the code of one exploit from the collection, called[…]

2016
28 Mar

Security researchers have discovered a new data-stealing Trojan that makes special use of USB devices in order to spread itself and does not leave any trace of activity on the compromised systems. Dubbed USB Thief ( or Win32/PSW.Stealer.NAI), the malware[…]

28 Mar

If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it. Doing so could cripple your system and could lead to a catastrophic destruction. Hackers are believed to be[…]

14 Feb

Bringing cyber to the board Cyber crime costs British businesses £34bn a year* Not just an IT issue, boards need to take note of consumers’ awareness and cynicism about how their data is used. Building the right cyber strategy, with[…]

31 Jan

In an effort to gauge the impact of the recent Juniper ScreenOS backdoors on government organisations, the House of Representatives is questioning around two dozen U.S. government departments and federal agencies. The U.S. House of Representatives’ Committee on Oversight and[…]

End