Tag Archive for: teams

Massive leak reveals Hacking Team’s most private moments in messy detail

Privacy and human rights advocates are having a field day picking through a massive leak purporting to show spyware developer Hacking Team’s most candid moments, including documents that appear to contradict the company’s carefully scripted PR campaign.

“Imagine this: a leak on WikiLeaks showing YOU explaining the evilest technology on earth! :-),” Hacking Team CEO David Vincenzetti wrote in a June 8 e-mail to company employees including Walter Furlan, whose LinkedIn profile lists him as the international sales engineer of the spyware developer. “You would be demonized by our dearest friends the activists, and normal people would point their fingers at you.”

Other documents suggested the US FBI was among the customers paying for software that allowed targets to be surreptitiously surveilled as they used computers or smartphones. According to one spreadsheet first reported by Wired, the FBI paid Hacking Team more than $ 773,226.64 since 2011 for services related to the Hacking Team product known as “Remote Control Service,” which is also marketed under the name “Galileo.” One spreadsheet column listed simply as “Exploit” is marked “yes” for a sale in 2012, an indication Hacking Group may have bundled some sort of attack code that remotely hijacked targets’ computers or phones. Previously, the FBI has been known to have wielded a Firefox exploit to decloak child pornography suspects using Tor.

Read 5 remaining paragraphs | Comments


Ars Technica » Technology Lab

Resilient Systems arms security teams with automated incident responses

Resilient systems has a new software module for its incident-response platform that lets network security pros respond quicker and with more certainty to attacks.

Called Action Module, it makes it possible to have automated responses at the ready so when actual incidents arise network admins can push a button to respond.

Because responses execute automatically when triggered, slow manual steps are taken out of the equation, making responses timelier and eliminating human error that might otherwise come into play.

“The upside is speed and effectiveness,” says Bruce Schneier, CTO of Resilient, “getting it fast and getting it right – no making mistakes. We’re talking about plumbing, but it’s really needed plumbing.”

To read this article in full or to leave a comment, please click here

Network World Tim Greene

China reveals existence of cyber warfare hacking teams – ZDNet


Breitbart News

China reveals existence of cyber warfare hacking teams
ZDNet
The country has continually denied the existence of military hackers who were believed to conduct these attacks. However, for the first time, China has formally revealed its military does have dedicated cyber warfare units — in fact, the state
China Reveals Its Cyberwar SecretsDaily Beast
China Reveals Its CyberWar Commando SquadBreitbart News
China admits having cyber warfare divisionsITProPortal
Techworm –Zee News
all 43 news articles »

cyber warfare – read more

BlackBerry teams with Samsung and IBM to offer governments a secure tablet

BlackBerry is returning to the tablet market—this time with the help of Samsung Electronics, IBM and Secusmart, the German encryption specialist BlackBerry bought last year.

This is not the PlayBook 2 that BlackBerry was rumored to be working on last year, but the SecuTablet, developed by Secusmart and IBM for a German government department.

The SecuTablet is a Samsung Galaxy Tab S 10.5 LTE 16GB bundled with some software from IBM and SecuSmart’s special MicroSD card, which combines a number of cryptographic chips to protect data in motion and at rest. Samsung’s Knox secure boot technology ensures that the OS on the tablet has not been tampered with, while IBM’s contribution to the security chain is to “wrap” certain apps in an additional layer of code that intercepts and encrypts key data flows using the Secusmart hardware.

To read this article in full or to leave a comment, please click here

Network World Security