In the ongoing Wikileaks Vault 7 series of leaks, there is a new leak called ExpressLane. According to the documents released by Wikileaks, the CIA offers a partnership with other law enforcement and government agencies in which those partners can share biometric data such as fingerprints with the CIA. The CIA does this by offering […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In the continuing saga of Vault 7 – the leaking of CIA hacking tools, Wikileaks made Mac, Linux and Unix users feel welcome. Instead of leaking Windows and Android malicious code, they leaked Mac, Linux and Unix tools instead. I guess they are equal opportunity leakers. In this case they just leaked the manuals so […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
When was the last time you patched your Internet router? Probably never. That is what the CIA is counting on. As well as foreign governments and just plain hackers. But when it comes to the CIA, they are probably not interested in you. That may not be the case when it comes to the other […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Earlier this month the folks at Cisco were sent into a frenzy when Wikileaks disclosed Cisco exploits in their Vault 7 CIA tool data dump. Wikileaks disclosed that the CIA had been hacking Cisco Internet switches for over a year to eavesdrop on users, but didn’t disclose how. Wikileaks and a number of the tech […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A group of hackers is threatening to wipe the devices of more than 600 million Apple users on April 7th using hacked Apple account passwords. According to the hackers 220 million of the credentials have been verified to work. Initially, the hackers asked for $75,000 in Bitcoin or Etherium, but they have raised that “request” […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It seems like the spy-guys (or is it spy-people) can’t seem to catch a break. First it was Snowden; more recently it was Martin – both Booz Allen contractors at the NSA. Now it is the CIA. Wikileaks published thousands of documents, which appear to be real, describing CIA hacking tools. This includes, supposedly, at […]
Continue reading →
[DISPLAY_ACURAX_ICONS]