On November 9th, 2017, WikiLeaks published six documents from the CIA’s Hive project – created by its Embedded Development Branch (EDB). Hive is a CIA back-end infrastructure malware that has a public-facing HTTPS interface, used by the agency’s implants to transfer obstructed data from target machines to the CIA. The program also receives commands from […]Read More
It’s a tedious job to look deep into the murky world of large-scale government arms dealings. It gets even notoriously harder separating the legitimate from illegitimate deals, in a world where lobbying, connections, and secrecy are part of the job.WikiLeaks, a whistleblowing site published a UAE dealmaker: Al Yusef. The published document has once again […]Read More
Imagine this situation. You are getting ready to board your plane when the flight attendant stops you at the entrance and says, “I’m sorry sir, but we can’t allow you to board this flight, your social credit score is not high enough”. Wait, say that again. If this sounds dystopian to you, that’s because it […]Read More
If you’re using a computer (and if you are reading this article, there’s a high chance that you do), you probably have a favorite operating system that you are willing to defend (hopefully just verbally) against users of other operating systems that say theirs is the best. It’s an old age debate as to which […]Read More
When Donald Trump announced that he will run for president of the United States a lot of people didn’t give him much chance. Sure, he was well known, but mostly as a somewhat controversial business magnate, not as a politician. Then, when he won the election on November 8, 2016 and was formally elected by […]Read More
Unless you really like to gamble, you are using some kind of malware or antivirus program to protect your system. But if the CIA really wants in, they’ll get in. And you won’t even know about it. WikiLeaks reveals in the Vault 7 documents a series of standards that the US Central Intelligence Agency uses […]Read More
Last year, WikiLeaks released 8,761 CIA documents containing interesting details about the technology, malware, viruses and other exploits and zero day vulnerabilities that the Central Intelligence Agency (CIA) is using. One interesting section of this document, titled Vault 7, details how the CIA is using the United States consulate in Frankfurt, Germany as a covert […]Read More