Article Trunk



Posts Tagged ‘Espionage’

UN calls for investigation after Saudis linked to Bezos phone hack

United Nations experts are calling for an investigation after a forensic report said Saudi officials “most likely” used a mobile hacking tool, such as one built by the NSO Group, to hack into the Amazon founder Jeff Bezos’ phone. Remarks made by U.N. human rights experts on Wednesday said mobile spyware was likely used to ...

Chinese spy defects to Australia, alleging election interference and cybercrimes

A purported agent of the Chinese intelligence service is seeking asylum in Australia, bringing with him explosive allegations of widespread interference in political affairs in that country, Taiwan, and elsewhere. He claims also to have run a cyberterrorism campaign against supporters of Hong Kong independence. ...

U.S. security experts admit China’s 5G dominance, push for public investment

U.S. security experts are conceding that China has won the race to develop and deploy the 5G telecommunications infrastructure seen as underpinning the next generation of technological advancement and warn that the country and its allies must develop a response — and quickly. “The challenge we have in the development of the 5G network, at ...

How tech is transforming the intelligence industry

Shay Hershkovitz Contributor Share on Twitter Shay Hershkovitz is a Senior Research Fellow at The Intelligence Methodology Research Center (IMRC). At a conference on the future challenges of intelligence organizations held in 2018, former Director of National Intelligence Dan Coats argued that he transformation of the American intelligence community must be a revolution rather than ...

Hackers ***** telecom networks across multiple continents to track a handful of targets

You might be popular, but are you Chinese hacker following your every move, no matter where you go popular?

No? It's cool. Not many people are.

According to cybersecurity firm Cybereason, Softcell, is digital attack and surveillance operation being run by a Chinese hacker group, most likely working their keyboards for the Chinese government. The focus of ...

Microsoft gains control of domains used by Iranian hackers linked to U.S. fugitive

03.28.2019 · Posted in Technology Articles

A U.S. court has granted Microsoft the authority to seize domain names in order to take down a phishing campaign run by a notorious group of Iranian hackers. In a post on Microsoft’s official blog, Customer Security & Trust VP Tom Burt shar... ...

Hannu Rajaniemi’s Summerland: a midcentury spy thriller, with the afterlife

Hannu Rajaniemi is the Finnish-Scottish mathematician and science fiction writer whose debut, 2012's Quantum Thief was widely celebrated; now, in Summerland, Rajaniemi delivers new kind of supernatural historical spy procedural, set in a 1938 where the afterlife has been discovered, colonized and militarized.

Rachel White is a spy who is trying to help the ...

In revamped transparency report, Apple reveals uptick in demands for user data

Apple’s transparency report just got a lot more — well, transparent. For years, the technology giant released a twice-a-year report on the number of government demands it received. It wasn’t much to look at in the beginning; a seven-page document with only two tables of data. Once in a while, Apple would tack on a ...

US intelligence community says quantum computing and artificial intelligence pose an ’emerging threat’ to national security

It’s not often you can put nuclear weapons, terrorism and climate change on the same list as quantum computing, artificial intelligence and the Internet of Things, but the U.S. government believes all pose an “emerging threat” to its national security. Several key agencies in the U.S. intelligence community were asked what they saw as long-term threats ...