Vault 7: CIA Can Spy on You Through Your Smart TV, iPhone, Android Device

Vault 7: CIA Can Spy on You Through Your Smart TV, iPhone, Android Device

Weeping Angel is the surveillance technique used to crack Samsung Smart TVs, makes it appear as if the TV is off

WikiLeaks Opens Vault 7: CIA's Entire Hacking Capacity

WikiLeaks Opens Vault 7: CIA's Entire Hacking Capacity

What's behind door number 7? Details of how the CIA turns all your devices into spying gear & how it exploits zero day

Two CWA Hackers Arrested for Hacking Several Three-Letter US Agencies

Two CWA Hackers Arrested for Hacking Several Three-Letter US Agencies

Authorities have arrested five suspected members in total

UK Police Arrests 16-Year-Old Boy on Suspicion of Hacking CIA, DHS, DOJ and FBI

UK Police Arrests 16-Year-Old Boy on Suspicion of Hacking CIA, DHS, DOJ and FBI

Former CWA members promise to avenge their comrade

US Spy Chief Hacked, How Ironic

US Spy Chief Hacked, How Ironic

James Clapper's My FiOS account hacked by CWA

CWA Hackers Dox 2,400 US Government Employees

CWA Hackers Dox 2,400 US Government Employees

Teenage hackers strike again, release details on thousands of government employees to protest US backing of Israel

Hackers Who Hit CIA Chief Are Now Going After FBI Deputy Director

Hackers Who Hit CIA Chief Are Now Going After FBI Deputy Director

Deputy Director's public statements anger the hackers

Tails Amnesic Incognito Live Linux OS Spotted on 'Homeland' TV Show

Tails Amnesic Incognito Live Linux OS Spotted on 'Homeland' TV Show

Tails Live CD is based on the Debian GNU/Linux OS

CIA Boss Personal Email Hacked by Teenager, Sensitive Documents Leaked on Twitter

CIA Boss Personal Email Hacked by Teenager, Sensitive Documents Leaked on Twitter

CIA director was sending sensitive docs to his AOL email

  • iWorld
  • By Sergiu Gatlan
  • September 21st, 2015
The CIA Might Be Behind the XcodeGhost iOS Malware

The CIA Might Be Behind the XcodeGhost iOS Malware

Researchers working with the CIA supposedly said in the past that they modified Apple's Xcode for similar purposes

  • Linux
  • By Marius Nestor
  • September 8th, 2015
Debian's Solution for Making Software Trustworthy Is Reproducible Builds - Video

Debian's Solution for Making Software Trustworthy Is Reproducible Builds - Video

Jérémy Bobbio makes the proposal at Chaos Communication Camp

With Proxyham, You Can Anonymously Connect to Public Wi-Fi from 2.5 Miles Away

With Proxyham, You Can Anonymously Connect to Public Wi-Fi from 2.5 Miles Away

You can run and you also can hide, for a while

Checking Apple’s Xcode Development Tool for CIA Tampering

Checking Apple’s Xcode Development Tool for CIA Tampering

No evidence that Strawhorse made it to operational stage

NSA and FBI Ask Tech Brokers for Access to ISP Data on Customers

NSA and FBI Ask Tech Brokers for Access to ISP Data on Customers

Most often than not, smaller ISPs don't directly handle govt data requests, but they task others to do it for them

Photo of the Day: The CIA Denies Any Knowledge of Tupac’s Whereabouts

Photo of the Day: The CIA Denies Any Knowledge of Tupac’s Whereabouts

At least they’ve apologized for not following back Ellen DeGeneres

Zelda Hyrule Warriors Trailer Shows Lana in Action

Zelda Hyrule Warriors Trailer Shows Lana in Action

The White Witch has the power to unleash spells on her enemies

NSA, FBI, and CIA Run Warrantless Searches on Americans' Data

NSA, FBI, and CIA Run Warrantless Searches on Americans' Data

The Director of National Intelligence had no qualms about exposing this in a letter sent to Senator Ron Wyden

 
Want more? Browse: