Dear Confide: “We would never” isn’t the same as “we can’t”
Confidential messenger service provides no authentication or integrity assurances. Continue reading Dear Confide: “We would never” isn’t the same as “we can’t”
Collaborate Disseminate
Confidential messenger service provides no authentication or integrity assurances. Continue reading Dear Confide: “We would never” isn’t the same as “we can’t”
Assange: Cache of cyber weapons was passed around “out of control” by contract hackers. Continue reading Assange accuses CIA of “historic act of devastating incompetence”
Exploits for easy-to-spot bug are trivial, reliable, and publicly available. Continue reading Critical vulnerability under “massive” attack imperils high-impact sites [Updated]
WikiLeaks dump includes a best (and worst) practices guide for exploit developers. Continue reading Malware 101: The CIA’s DOs and DON‘Ts for tool developers
CIA hackers wasted no time analyzing the blunders made by their NSA counterparts. Continue reading After NSA hacking exposé, CIA staffers asked where Equation Group went wrong
Docs claim CIA can defeat WhatsApp, Signal, Telegram encryption, among other apps. Continue reading WikiLeaks publishes docs from what it says is trove of CIA hacking tools
Meaner strain of Shamoon makes comeback, joined by new, never-before disk wiper. Continue reading This hard drive will self destruct. Data-wiping malware targets Europe
As a candidate, Trump VP castigated Clinton for use of a private e-mail server. Continue reading Mike Pence used an AOL e-mail account for state business and it got hacked
Delivered by “secure” Word doc, pure PowerShell malware gets its orders via DNS. Continue reading Researchers uncover PowerShell Trojan that uses DNS queries to get its orders
Nation-sponsored attackers targeted 26 specific accounts. Continue reading Yahoo cookie hacks affected 32 million accounts, CEO forgoes bonus