New approach in radical propaganda

20/12/2007 Written by minor

maskIt is no secret, that rad­i­cals and ter­ror­ists are using dif­fer­ent approaches to get new mem­bers and sup­port­ers. One of them is also Web and rad­i­cal web­sites and forums. Such web­sites pro­vide con­tent, that is intended to spread the ideas among vis­i­tors.

Cre­ators of this con­tent are mostly anony­mous per­sons, but now the vis­i­tors have a pos­si­bil­ity to place ques­tions to real per­son, for some — their icon: Ayman al-​Zawahiri, Guardian informed. Media arm of al-​Qaida — Al-​Sahab said, that Zawahiri would answer the ques­tions as much as he is able.

Read more

Data theft triple rise

11/12/2007 Written by minor

keysIt is well known to all of us — data theft or data loss is one of the night­mares. This year sto­ries brought embar­rass­ing inci­dent in UK, 25 mil­lion peo­ple, their per­sonal and bank details are at risk thanks two disks in mail. Given fact that UK has around 60 mil­lions of cit­i­zens, more than every 3rd is affected by this.
Num­ber is impres­sive, but it is not the only inci­dent that hap­pened this year. USA Today reported, that more than 162 mil­lions of records has been stolen this year. When com­par­ing to year 2006, when “only” more than 49.7 mil­lions were stolen, this indi­cates clearly the aim of the attack­ers — pri­vate and busi­ness data.

Read more

Cyber attack on U.S. nuclear lab

10/12/2007 Written by minor

china1Few weeks ago we informed about rise of Chi­nese cyber­war­riors. Now, another attack against U.S. government’s nuclear weapons lab­o­ra­to­ries may have orig­i­nated in China, NY Times informed. Attack was reported last week in con­fi­den­tial mem­o­ran­dum dis­trib­uted to pub­lic and pri­vate secu­rity offi­cials issued bu U.S. Depart­ment of
Home­land Secu­rity.

Mem­o­ran­dum included list of web and Inter­net addresses linked to loca­tions in China. Oak Ridge National Lab­o­ra­tory in Ten­nessee dis­closed, that clas­si­fied infor­ma­tions were not com­pro­mised. Full extent of the intru­sion is still under inves­ti­ga­tion.

Read more

Google owns us?

28/11/2007 Written by minor

earth1Google is real giant. We have now Google pow­ered search, email, office appli­ca­tions, blogs, satelite maps… We would like to not make any com­mer­cial to these ser­vices, every­body can make his deci­sion and use it at own risk.

Of course, every activ­ity you do on Google is logged — your searches, emails, even doc­u­ments you open using Google Docs are saved. And, don’t for­get — all this can be used one day against you. Maybe a bit para­noid view, but, con­sid­er­ing lat­est ini­tia­tive from Google house, we should really take care about our pri­vacy.

Read more

Interview with Dan Egerstad

22/11/2007 Written by minor

egerstad Few days ago we informed about raid in house of Dan Egerstad. Now he agreed with brief inter­view, where we tried to get his point of view on the issue.

Could you please explain, how did you come to the idea of cre­at­ing exit TOR nodes and inter­cept­ing traf­fic?

I wanted to know how many peo­ple were encrypt­ing their mails and needed some fig­ures for a lec­ture I was hold­ing. Set­ting up a ToR node to ana­lyze mail-​traffic was an easy way to get some num­bers. Right before shut­ting this auto­mated process down I by acci­dent saw an email that caught my eye and led me to doing this in a big­ger way.

Read more

8 9 10 11 12 13 14 15 16 17
ZONE-H In Numbers
  • News: 4.739
  • Admins: 3
  • Registered Users: 169.583
  • Early Warning subscriptions: 8205
  • Digital Attacks: 15.361.496
  • Attacks On Hold: 482.884
  • Online Users: 86
Login




 Lost password ?

Events
  • M
  • T
  • W
  • T
  • F
  • S
  • S
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  •  
  •  
  •  
  •