The Hacker News | Biggest Information Security Channel

NSA Stole Millions Of SIM Card Encryption Keys To Gather Private Data

NSA Stole Millions Of SIM Card Encryption Keys To Gather Private Data

Edward Snowden is back with one of the biggest revelations about the government's widespread...
Spy Agencies Rely on Hackers for Stolen Data and Monitoring Security Experts for Expertise

Spy Agencies Rely on Hackers for Stolen Data and Monitoring Security Experts for Expertise

The NSA and GCHQ have tracked and monitored the activities of independent and nation-state hack...
China Demands Tech Companies to give them Backdoor and Encryption Keys

China Demands Tech Companies to give them Backdoor and Encryption Keys

A number of western companies are doing big business in China, but now they may have to pay a hu...
Links Found between NSA, Regin Spy tool and QWERTY Keylogger

Links Found between NSA, Regin Spy tool and QWERTY Keylogger

​Researchers have uncovered a new evidence that a powerful computer program discovered last year,...
Chinese Spies Stole Australia’s New F-35 Lightning-II fighter Jet Design, Snowden Reveals

Chinese Spies Stole Australia’s New F-35 Lightning-II fighter Jet Design, Snowden Reveals

The latest document release by Edward Snowden revealed the industrial-scale cyber-espionage operati...
UK Prime Minister wants to Ban Encrypted Messaging Apps

UK Prime Minister wants to Ban Encrypted Messaging Apps

The terrible terrorist attacks in France forced the British Prime Minister David Cameron to con...
Google Releases Chrome Extension for End-To-End Email Encryption

Google Releases Chrome Extension for End-To-End Email Encryption

Back in june this year, Google announced an alpha Google Chrome extension called " End-to...
81% of Tor Users Can be Easily Unmasked By Analysing Router Information

81% of Tor Users Can be Easily Unmasked By Analysing Router Information

Tor has always been a tough target for law enforcement for years and FBI has spent millions of ...
Core Secrets — NSA Used ‘Undercover Agents’ In Foreign Companies

Core Secrets — NSA Used ‘Undercover Agents’ In Foreign Companies

Sometimes we wonder that how the National Security Agency ( NSA ) reached such a wide range of i...
FBI Not Happy With Apple & Google's Encryption Policy

FBI Not Happy With Apple & Google's Encryption Policy

Users might have praised the technology companies for efforts to encrypt their latest devices th...
Next 'Android L' To Enable Full Disk Encryption By Default

Next 'Android L' To Enable Full Disk Encryption By Default

The search engine giant Google will soon come up with its next version of Android operating sys...
Treasure Map — Five Eyes Surveillance Program to Map the Entire Internet

Treasure Map — Five Eyes Surveillance Program to Map the Entire Internet

The National Security Agency and its British counterpart, GCHQ , gained secret access to the Ge...
Fake Cell Phone Towers Could Be Intercepting Your Calls

Fake Cell Phone Towers Could Be Intercepting Your Calls

A notable number of cell phone towers around the United States are rogue that, according to late...
ICREACH — NSA's Secret Google-Like Search Engine for Metadata Analysis

ICREACH — NSA's Secret Google-Like Search Engine for Metadata Analysis

The United States National Security Agency ( NSA ) is using a massive information sharing platfo...
'Google Is Worse Than the NSA'  —  Rupert Murdoch

'Google Is Worse Than the NSA' — Rupert Murdoch

The United States National Intelligence Agency ( NSA ) or the largest Internet giant Google - Ac...
Hillary Clinton's Phone Intercepted by German intelligence Agency

Hillary Clinton's Phone Intercepted by German intelligence Agency

After the allegations that the U.S. National Security Agency ( NSA ) not only conducted mass su...
GCHQ's HACIENDA Port Scanning Program Targeting Devices in 27 Countries

GCHQ's HACIENDA Port Scanning Program Targeting Devices in 27 Countries

Have you ever used Shodan search engine? A publicly available service crawls the Internet lookin...