Edward Snowden’s Haven app turns your laptop into a security system

By Asad Gilani
Most sensitive users of technology, especially those in journalism and
This is a post from HackRead.com Read the original post: Edward Snowden’s Haven app turns your laptop into a security system
Continue reading Edward Snowden’s Haven app turns your laptop into a security system

“ProtonMail Contacts” world’s first encrypted contacts manager is here

By Waqas
The world-renowned encrypted email service provider ProtonMail is back in the
This is a post from HackRead.com Read the original post: “ProtonMail Contacts” world’s first encrypted contacts manager is here
Continue reading “ProtonMail Contacts” world’s first encrypted contacts manager is here

Kaspersky Investigators Reveal How NSA Hacking Tools Were Stolen

By Uzair Amir
In its latest report, Kaspersky Lab revealed the findings of
This is a post from HackRead.com Read the original post: Kaspersky Investigators Reveal How NSA Hacking Tools Were Stolen
Continue reading Kaspersky Investigators Reveal How NSA Hacking Tools Were Stolen

Report Claims Russia Stole NSA Tools Using Kaspersky Software

By Uzair Amir
The Wall Street Journal has reported that Russian government-sponsored hackers
This is a post from HackRead.com Read the original post: Report Claims Russia Stole NSA Tools Using Kaspersky Software
Continue reading Report Claims Russia Stole NSA Tools Using Kaspersky Software

WikiLeaks Posts User Manuals for CIA Malware AfterMidnight and Assassin

By Jahanzaib Hassan

WikiLeaks recently leaked some files as part of its Vault 7 series, that contained user manuals for two malware called, Assassin and AfterMidnight. According to the documents, these viruses belong to the CIA. RELEASE: CIA remote control & subversion malware systems ‘After Midnight’ and ‘Assassin’ https://t.co/S64RmEsHYl #Vault7 pic.twitter.com/5fMTeqW007 — WikiLeaks (@wikileaks) May 12, 2017 What […]

This is a post from HackRead.com Read the original post: WikiLeaks Posts User Manuals for CIA Malware AfterMidnight and Assassin

Continue reading WikiLeaks Posts User Manuals for CIA Malware AfterMidnight and Assassin