spying

US cellphone spy program turned prison jammers against us

US cellphone spy program turned prison jammers against us

Flying overhead in a Cessna aircraft, the Justice Department may very well be sending a cellphone dragnet over your city right now. This plane will use an amplified cell signal that'll override the next-most powerful signal in your area, tapping in to your phone's automatic aim to connect to the best signal in range. With this connection, the U.S. Marshals Service will summon registration data for the lot of the phones it's located, aiming to ping a single phone in the process. All other phone data is said to be dropped. But there's more to this equation than simple information gathering.

Continue Reading

US DOJ accused of stealing cellphone data via “dirtyboxes”

US DOJ accused of stealing cellphone data via “dirtyboxes”

A troubling new report suggest the Department of Justice has been engaging in a practice that gave them data from your smartphone, but it’s not what you might think. Rather than wiretaps and hacking, the DOJ is instead accused of flying overhead with a device that spoofed a signal tower your carrier would have. In fooling your phone into thinking it was simply searching for a signal, the DOJ was pinching the data from it. The reason given? The never-ending hunt for criminals.

Continue Reading

China allegedly using iCloud to spy on its own citizens

China allegedly using iCloud to spy on its own citizens

While Apple fans, both around the globe and in China, might be celebrating the availability of the new iPhone 6 and iPhone 6 Plus smartphones in the country, they should probably start rethinking their merry thoughts, depending on their beliefs on how much the government should be able to access about their personal lives. A report is now surfacing that the Chinese regime is using its famous (or infamous) "Great Firewall of China" to compromise the security and privacy of iCloud users using an age-old man-in -the-middle attack.

Continue Reading

First Chinese iOS Trojan Xsser mRAT targets Hong Kong activists

First Chinese iOS Trojan Xsser mRAT targets Hong Kong activists

Protesters and activists these days have flocked to social media and mobile technology to circumvent censorship and blockades that prevent their message from reaching other people. But now the tables might have been turned on them. A new trojan malware called Xsser mRAT that infects iOS as well as Android devices has been discovered to be of Chinese origin and is seemingly targeting Hong Kong's Occupy Central movement.

Continue Reading

WikiLeaks reveals malware targeting journalists, activists

WikiLeaks reveals malware targeting journalists, activists

WikiLeaks has dropped another bombshell, this time in the form of software, for those already weary of governments all over the world spying on people, whether they be their citizens for not. It is giving out malware developed by German company FinFisher in the hopes that countermeasures can be developed to give its intended targets, journalists, activists, and political dissidents, a fighting chance.

Continue Reading

Cyborg Unplug keeps Google Glass and drones away

Cyborg Unplug keeps Google Glass and drones away

While we might drool over technology and gadgets that make us into virtual cyborgs or commanders of an army of flying robots, privacy advocates are more concerned about the potential risks and violations that could happen. Enter Unplug, a hand-sized gadget that may not be able to completely keep out Glass users and drones from your home or business establishment but will at least keep them off your Internet network and hinder them from uploading and spreading their spy shots.

Continue Reading

NSA’s ICREACH search engine gave info to foreign agencies

NSA’s ICREACH search engine gave info to foreign agencies

It seems the NSA didn’t need a backdoor after all. A new report says the NSA, who have been found to be working on all sorts of intrusive electronic things, may have jumped the shark, internationally speaking. Called ICREACH, the NSA’s search engine essentially kept a detailed log of information on us, and was available to a variety of agencies across the globe.

Continue Reading

1 2 3 4 5 6