google

How to Stop Google from Recording Your Voice Searches and Increase Online Anonymity

The fact that Google gathers personal data on its users using a variety of their services is in no way recent news. It has...
Conceptual image of a NSA processor inside a computer.

Edward Snowden Thinks Russia Is Behind The NSA Hack

Edward Snowden, the whistleblower, is of the belief that, in all probability, Russia is responsible for the alleged US National Security Agency (NSA) hack. Hackers allegedly got hold of digital arsenal or malware deployed by Equation Group, the cyber espionage unit that has links with the NSA.
FBI Logo

Ruling Says FBI Cannot Collect Foreign Data With A Warrant

Recently, in a landmark ruling that favored privacy, a panel of judges announced that any search warrant sent to Microsoft cannot be applied outside the country’s borders. In the particular case, the appeals court made it clear that Microsoft is not compelled to divulge the email communications that formed part of a drug investigation.
FBI Wants To Access Browsing History Without A Warrant

FBI Wants To Access Browsing History Without A Warrant

An amendment to the surveillance law is being sought by the Obama administration so that the FBI is vested with the authority to access internet browsing history of a person without a warrant in cases involving espionage and terrorism, according to reports.

How Hackers Get Rich Spreading Malware

Computer viruses and malware are spreading faster than their biological counterparts it seems. Numbers from security firms point to the fact that close to 20 million malware threats have been neutralized in the first quarter of 2016. This equates to about 27,000 in one single day.

Sci-Hub Has A New Feature

Sci-Hub has introduced a new feature, a Telegram Messenger app, which helps users to search for peer-reviewed academic papers. Users’ communication with the app is encrypted.

WhatsApp Blockage In Brazil

On May 2, 2016, a judge from the state of Sergipe ordered all mobile carriers across Brazil to block the popular messaging service Whatsapp for 72 hours.The ban was supposedly imposed because WhatsApp did not comply with the police and provide information during an ongoing investigation.

Hackers Said To Donate Money To Charity

A new strain of ransomware, nicknamed CryptMix, is promising hacking victims that part of the money they send to unlock their blocked files will be donated to a kids’ charity.

Hacker Allegedly Selling 272 Million Credentials For Less Than $1

Anonymous Russian hacker going by the moniker “The Collector” is allegedly selling the 272 million credentials in the form of emails and passwords in the dark web for less than a dollar.
man pressing lock icon with binary code, cyber security concept.

Supreme Court Grants FBI Permission To Hack Virtually Anyone

Users of anonymity services such as Tor and VPN could be hacked as well as spied by law enforcement agencies, including the FBI, under the new law changes approved by the US Supreme Court.

Bitcoin Creator Finally Revealed His Identity

Bitcoin is the dominant player over cryptocurrencies, allowing consumers to make electronic transactions without any fees, nor have to use commercial banks, companies, or the government as intermediaries.

Feds Tell Senators How They Hack iPhone

The iPhone 5C has been the heart of the contentious ongoing public spat between Apple and the FBI. This Apple product was used by gunman Syed Rizwan Farook in the terrorist attack that killed 14 people in San Bernardino, California last December. FBI has cracked its way into the iPhone 5C, but the Apple-FBI saga continues as the agency spills the beans of the hack to members of Congress.

DoD Now Accepts Applications For “Hack the Pentagon” Program

The US Department of Defense has started accepting applications for its “Hack the Pentagon” commercial bug bounty program. According to an announcement released by the Defense Department, the goal of the Hack the Pentagon program is to identify as well as resolve vulnerabilities in security within the department’s websites through crowdsourcing.

NSA Whistleblower Edward Snowden At LibrePlanet Conference

A look back in January of this year is the announcement that thrilled, if not shook the earth. The FSF revealed that National Security Agency whistleblower, Edward Snowden, is bound to be the opening keynote for the upcoming LibrePlanet 2016.

Edward Snowden Willing To Return To US If Guaranteed A Fair Trial

Truth be told, anyone who was alive in the infamous Julian Assange era also caught wind of famed former NSA contractor Edward Snowden. Apparently, the whistleblower has been hiding in Russia, for almost three years after he did the unthinkable - divulged the highly classified intelligence records that featured “activities the US federal government would rather have remain under the radar.”

Hacker Known As “Cracka” Arrested Over FBI, DHS Data Breaches

FBI and DHS Data BreachesCops in East Midlands, England have arrested a 16 yr. old boy allegedly behind the FBI and DHS data breaches. The...

DHS And FBI Employees’ Data Exposed In Hack

A few days ago, hackers have reportedly released more than 20,000 confidential FBI employee data to the internet. The exposure came only a day after...

Vuvuzela, A New Anonymity Tool Created By MIT Researchers

What is Vuvuzela?The new anonymity network system prototype (anonymity network) was developed by researchers Nickolai Zeldovich, David Lazar, Jelle van den Hoof, and Matei Zaharia from the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL). It derives its name from one for the world’s most annoying and noisy musical instruments (as seen from the 2010 FIFA World Cup), the “Vuvuzela.” The network’s name couldn’t have been any more precise as its core functionality involves spamming legitimate conversations with a noisy atmosphere to enforce anonymity.

Secure Messaging App

TextSecure is an open-source messaging app for exchanging encrypted messages made by Open Whisper Systems. All messages send through TextSecure are end-to-end encrypted, meaning that they are encrypted before being sent and decrypted after arriving on recipient’s device. This makes it impossible for any third party to intercept sensitive data being traded.

Secure And Anonymous Email Service

Name: Lelantos Description: Lelantos is a secure and anonymous email service operating and offering its services to Tor users.Given its nature as an anonymous email provider,...

Choosing The Best Shredders

Name: Bonsaii DocShred C156-C 8-Sheet Micro-Cut Description: As far as physical shredders go, there are several factors that need to be looked into when deciding on...

Socks Proxy Services: Vip72, AnyProxy, PremSocks

Name: Vip72, AnyProxy, PremSocks Description: Vip72 is the largest provider of Socks proxy service claiming to offer proxies from 130 countries and over 25 thousand available...

Guide to Tails OS

Introduction: Tails is an operating system aimed at protecting the user’s anonymity.Unlike a standard operating system like Windows or Linux, it does not need to...

Tor – A Beginner’s Guide

Intro: If you want to browse the Deep Web, Tor, The Onion Router, is a critical first step.Without it your dreams of deep web adventures,...

Grams Helix – Bitcoin Tumbling Service

Name: Grams HelixDescription: Helix is a bitcoin tumbling service created and operated by the creator of Grams. What tumbling your “Bitcoin” does is let you mix...

CyberScrub: For Safe And Secure Data Deletion

Name: CyberScrub Description: CyberScrub is software used for safely and completely erasing data from your drive. It is a fact that erasing data or formatting a hard...

PGP (Pretty Good Privacy)

Name: PGP (Pretty Good Privacy)Description:PGP or Pretty Good Privacy is software developed for the purpose of providing good, fast and accessible encryption to anyone...

Behavioral Profiling – Risk To Anonymity And Privacy

Deriving information from a person from a website they visit is not something new, but making an inference from their speed of keying in...
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

OPM Data Appears To Be For Sale – Is it Legit?

Back in Mid-April, the Office of Personnel Management in the US discovered a major security breach that had caused on the leaking of data...

Major Security Breach Leaks Files Of Over 4.1 Million US Government Employees on the...

Almost as if to spite the NSA’s expansion of its Internet “defense” program, or spying to the rest of us, a major data breach...

Section 215 Dies – Freedom Act To Take Its Place

On June 1st, the Patriot Act expired at long last. Most importantly, it took with it the infamous section 215 that has allowed the...

NSA Planned To Hack App Stores To Track Smartphones

As I write this, just a week remains until the patriot act expires, and the end hopefully comes to years of unconstitutional, unwarranted surveillance...

The NSA Surveillance Is Not Ending Any Time Soon

Thanks to the leaks made by Edward Snowden two years ago, most people are now aware that the NSA has the power of unwarranted...

Send this to a friend