Tag: Hacking

Will Interacting with the “Wrong” Post Get You Sent to Facebook Jail?

A recent Reuters report about the supposed prevalence of so-called “fake news” ahead of Mexico’s upcoming election this weekend quotes an anonymous Facebook employee who alleged that people are being paid to like, share, and comment on posts, which disturbingly suggests that the company might take punitive action against users who innocently interact with what the company deems to be...

#Vault7: CIA’s Secret Cyberweapon can Infiltrate World’s Most Secure Networks

WikiLeaks’ latest release in its Vault7 series details how the CIA’s alleged ‘Brutal Kangaroo’ program is being used to penetrate the most secure networks in the world. Brutal Kangaroo, a tool suite for Microsoft Windows, targets closed air gapped networks by using thumb drives, according to WikiLeaks. Air gapping is a security measure employed on one or more computers to...

Watching You While You Browse: How the CIA has been Hacking Your Router

Wi-Fi routers typically sit in dusty corners of homes and offices, quietly transmitting internet accessibility to computers, tablets and phones in its immediate vicinity. However, these unpretentious devices are a goldmine for hackers – and were specifically targeted by the US Central Intelligence Agency, the latest Wikileaks release has revealed. The release is the latest instalment of Wikileaks’ “Vault7” series, which...

Chasing Lazarus: A Hunt for the Infamous Hackers to Prevent Large Bank Robberies

Kaspersky Lab (www.Kaspersky.co.za) has published the results of its more-than-year-long investigation into the activity of Lazarus – a notorious hacking group allegedly responsible for the theft of 81 million dollars from the Central Bank of Bangladesh in 2016. During the forensic analysis of artefacts left by the group in South-East Asian and European banks, Kaspersky Lab has reached a deep...

CIA’s NightSkies Tool can Hack, Remotely Control iPhones Without User Knowing

WikiLeaks has revealed the CIA’s alleged ability to infiltrate and control iPhones through a tool called NightSkies, which is physically installed onto factory fresh iPhones and allows the CIA to monitor and download files from targets’ phones undetected. The revelation is part of WikiLeaks’ latest Vault 7 release named ‘Dark Matter.’ NightSkies works in the background and grants “full remote...

What is the CIA Hack All About? The Danger Lies in What Might be Coming Next

The WikiLeaks exposure of thousands of documents relating to the Central Intelligence Agency’s (CIA) hacking program, which was expanded dramatically under President Barack Obama between 2013 and 2016, has created something of a panic in the users of cell phones, online computers and even for smart television viewers. The documents describe “more than a thousand hacking systems, trojans, viruses and...