Mexican spy scandal escalates as study shows software targeted opposition | World news | The Guardian

The spy software – known as Pegasus and made by the Israeli firm NSO Group – is only sold to governments, supposedly for use against terrorists and criminals. But an investigation by researchers at the University of Toronto revealed that it was deployed against Mexican anti-corruption crusaders, journalists investigating the president, and activists pushing for a soda tax.

Fuente: Mexican spy scandal escalates as study shows software targeted opposition | World news | The Guardian


Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian

The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.

Fuente: Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian


NYU Accidentally Exposed Military Code-breaking Computer Project to Entire Internet

The supercomputer described in the trove, “WindsorGreen,” was a system designed to excel at the sort of complex mathematics that underlies encryption, the technology that keeps data private, and almost certainly intended for use by the Defense Department’s signals intelligence wing, the National Security Agency. WindsorGreen was the successor to another password-cracking machine used by the NSA, “WindsorBlue,” which was also documented in the material leaked from NYU and which had been previously described in the Norwegian press thanks to a document provided by National Security Agency whistleblower Edward Snowden. Both systems were intended for use by the Pentagon and a select few other Western governments, including Canada and Norway.

Fuente: NYU Accidentally Exposed Military Code-breaking Computer Project to Entire Internet


Leaked NSA Malware Is Helping Hijack Computers Around the World

In mid-April, an arsenal of powerful software tools apparently designed by the NSA to infect and control Windows computers was leaked by an entity known only as the “Shadow Brokers.” Not even a whole month later, the hypothetical threat that criminals would use the tools against the general public has become real, and tens of thousands of computers worldwide are now crippled by an unknown party demanding ransom.

Fuente: Leaked NSA Malware Is Helping Hijack Computers Around the World


Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador

El gigante de la informática criticó el papel de los gobiernos y organizaciones que coleccionan vulnerabilidades informáticas que después pueden ser robadas o vendidas a delincuentes informáticos. La empresa pide que lo sucedido sea una lección para erradicar esta práctica en el mundo.

Fuente: Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador


Japan Made Secret Deals With the NSA That Expanded Global Surveillance

The documents, published Monday in collaboration with Japanese news broadcaster NHK, reveal the complicated relationship the NSA has maintained with Japan over a period of more than six decades. Japan has allowed NSA to maintain at least three bases on its territory and contributed more than half a billion dollars to help finance the NSA’s facilities and operations. In return, NSA has kitted out Japanese spies with powerful surveillance tools and shared intelligence with them. However, there is a duplicitous dimension to the partnership. While the NSA has maintained friendly ties with its Japanese counterparts and benefited from their financial generosity, at the same time it has secretly spied on Japanese officials and institutions.

Fuente: Japan Made Secret Deals With the NSA That Expanded Global Surveillance


Leaked NSA Malware Threatens Windows Users Around the World

“This is as big as it gets,” Hickey said. “Nation-state attack tools are now in the hands of anyone who cares to download them…it’s literally a cyberweapon for hacking into computers…people will be using these attacks for years to come.”

Fuente: Leaked NSA Malware Threatens Windows Users Around the World


Ciberguerra: cuando el arma más poderosa es un ejército de hackers

La ciberguerra ha dejado de ser una excentricidad reservada a actos aislados, a pequeñas cosas. Las nuevas tecnologías forman parte de los civiles y sus ejércitos. Y atacarlas se ha puesto a la par de la guerra convencional.

Fuente: Ciberguerra: cuando el arma más poderosa es un ejército de hackers


Wiretaps, data dumps and zero days: is digital privacy no longer possible? – video | World news | The Guardian

From Russian hacking to WikiLeaks, Edward Snowden and CIA cyber weapons, does digital surveillance mean the end of privacy?

Fuente: Wiretaps, data dumps and zero days: is digital privacy no longer possible? – video | World news | The Guardian


Gobiernos en guerra contra WhatsApp por su cifrado de extremo a extremo – El Mostrador

Tras el ataque al Parlamento Británico ocurrido la semana pasada, los políticos británicos han exigido que Whatsapp y otras aplicaciones de mensajería instantánea proporcionen acceso a la policía y fuerzas de seguridad para así poder monitorear conversaciones terroristas. Sin embargo, los expertos en tecnología discuten que abrir las “puertas traseras” de los servicios de mensajería popular, las cuales usan cifrado de extremo a extremo, arrojaría una serie de problemas.

Fuente: Gobiernos en guerra contra WhatsApp por su cifrado de extremo a extremo – El Mostrador


Apple Says It Fixed CIA Vulnerabilities Years Ago

Yesterday, WikiLeaks released its latest batch of pilfered CIA material, five documents describing malicious software for taking over Apple MacBooks and iPhones, and wrote in an accompanying post that “the CIA has been infecting the iPhone supply chain of its targets,” prompting concerned readers to wonder if their iPhone or MacBook had been infected on the factory floor. In a statement, Apple says that is almost certainly not the case.

Fuente: Apple Says It Fixed CIA Vulnerabilities Years Ago


Wikileaks filtra nuevos documentos secretos sobre cómo “hackeaba” la CIA cualquier iPhone o Mac – El Mostrador

Bajo el nombre “Dark Matter” Wikileaks publicó una nueva tanda de documentos secretos, en los que detalla varios proyectos de la CIA para lograr infectar y “hackear” cualquier iPhone o Mac.

Fuente: Wikileaks filtra nuevos documentos secretos sobre cómo “hackeaba” la CIA cualquier iPhone o Mac – El Mostrador


With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian

Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?

Fuente: With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian


Malware Attacks Used by the U.S. Government Retain Potency for Many Years, New Evidence Indicates

A new report from Rand Corp. may help shed light on the government’s arsenal of malicious software, including the size of its stockpile of so-called “zero days” — hacks that hit undisclosed vulnerabilities in computers, smartphones, and other digital devices.The report also provides evidence that such vulnerabilities are long lasting. The findings are of particular interest because not much is known about the U.S. government’s controversial use of zero days.

Fuente: Malware Attacks Used by the U.S. Government Retain Potency for Many Years, New Evidence Indicates


WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian

The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices.

Fuente: WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian


Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices

It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.

Fuente: Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices


WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador

La información revelada hoy sobre “hacking” (ataque cibernético) es parte de una serie en siete entregas que define como “la mayor filtración de datos de inteligencia de la historia”.

Fuente: WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador


The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant | Motherboard

In January, Motherboard reported on the FBI’s “unprecedented” hacking operation, in which the agency, using a single warrant, deployed malware to over one thousand alleged visitors of a dark web child pornography site. Now, it has emerged that the campaign was actually an order of magnitude larger.

Fuente: The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant | Motherboard


How old do you look? I wouldn’t ask the internet | Tim Dowling | Opinion | The Guardian

The how-old.net website – which uses photos to judge your age – didn’t work for me. For women and refugees, of course, there’s the Daily Mail

Fuente: How old do you look? I wouldn’t ask the internet | Tim Dowling | Opinion | The Guardian


Hillary Clinton’s Encryption Proposal Was “Impossible,” Said Top Adviser

Hillary Clinton’s advisers recognized that her policy position on encryption was problematic, with one writing that it was tantamount to insisting that there was “‘some way’ to do the impossible.”Instead, according to campaign emails released by Wikileaks, they suggested that the campaign signal its willingness to use “malware” or “super code breaking by the NSA” to get around encryption.

Fuente: Hillary Clinton’s Encryption Proposal Was “Impossible,” Said Top Adviser


Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email

Contrary to a denial by Yahoo and a report by the New York Times, the company’s scanning program, revealed earlier this week by Reuters, provided the government with a custom-built back door into the company’s mail service — and it was so sloppily installed that it posed a privacy hazard for hundreds of millions of users, according to a former Yahoo employee with knowledge of the company’s security practices.

Fuente: Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email


Las detenciones irregulares en São Paulo que empezaron con un militar infiltrado en Tinder | Internacional | EL PAÍS

EL PAÍS reconstruye la detención de 21 personas antes de una marcha contra el presidente Temer el pasado día 4Los manifestantes sospechan que un militar se infiltró en varias redes sociales, entre ellos una de ligue, para identificarlos

Fuente: Las detenciones irregulares en São Paulo que empezaron con un militar infiltrado en Tinder | Internacional | EL PAÍS


“Un Estado democrático debería garantizar el voto secreto” » Noticias Urbanas

A un año de las elecciones legislativas, y a tres meses de que pueda legalizarse el voto electrónico en todo el país, Noticias Urbanas consultó a expertos informáticos para conocer más sobre la BUE.

Fuente: “Un Estado democrático debería garantizar el voto secreto” » Noticias Urbanas


Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas

Un grupo de hackers vinculado a la Agencia de Seguridad Nacional de los Estados Unidos, mejor conocida como la NSA (National Security Agency), ha sido hackeado recientemente y sus herramientas de espionaje, recolección de información, malware y más, han sido puestas en venta por 1 millón de bitcoins (más de 550 millones de dólares al momento de la publicación).

Fuente: Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas


¿Son estas las armas de espionaje de la NSA? | Derechos Digitales

Un grupo de hackers dice haber obtenido información confidencial de Equation Group, un conocido y sofisticado grupo de ciber atacantes ligado a la NSA. Parte de la información publicada permite por primera vez echar un vistazo a las herramientas utilizadas por la agencia de seguridad estadounidense.

Fuente: ¿Son estas las armas de espionaje de la NSA? | Derechos Digitales


Israeli firm accused of creating iPhone spyware | World news | The Guardian

An Israeli technology company has been accused of creating and supplying an aggressive interception program capable of taking over Apple’s iPhones and turning them into remote spying devices, after it was allegedly used to target a Middle Eastern human rights activist and others.

Fuente: Israeli firm accused of creating iPhone spyware | World news | The Guardian


Justice department ‘uses aged computer system to frustrate Foia requests’ | Politics | The Guardian

A new lawsuit alleges that the US Department of Justice (DoJ) intentionally conducts inadequate searches of its records using a decades-old computer system when queried by citizens looking for records that should be available to the public.

Fuente: Justice department ‘uses aged computer system to frustrate Foia requests’ | Politics | The Guardian


“La ciberguerra sería una forma de terrorismo de Estado”

El libro pretende incentivar la mirada crítica entre el gran público ante los acontecimientos calificados de “ciberguerra” y alertar de la coartada que puede proporcionar el tremendismo sensacionalista en estos temas a quienes pretenden recortar libertades o privacidad.

Fuente: “La ciberguerra sería una forma de terrorismo de Estado”


FBI’s Secret Surveillance Tech Budget Is ‘Hundreds of Millions’

The FBI has “hundreds of millions of dollars” to spend on developing technology for use in both national security and domestic law enforcement investigations — but it won’t reveal the exact amount.

Fuente: FBI’s Secret Surveillance Tech Budget Is ‘Hundreds of Millions’


Sólo actas de 1.300 cabildos de más de13.000 serán validadas por problemas en la web – El Mostrador

Una seria advertencia hicieron algunos miembros del Consejo Ciudadano de Observadores (CCO) respecto a que sólo actas de 1.300 cabildos de los más de 13.000 que están inscritos serán validadas e incluidas en el texto final del gobierno, debido a que la página web ha presentado deficiencias como el no contar con un sistema de autoguardado y problemas de conexión.

Fuente: Sólo actas de 1.300 cabildos de más de13.000 serán validadas por problemas en la web – El Mostrador


Tedic rechaza afirmaciones del Gobierno sobre sistemas de espionaje

La organización no gubernamental Tecnología, Educación, Desarrollo, Investigación y Comunicación (Tedic) rechazó las expresiones del ministro de la Secretaría Nacional Antidrogas (Senad), Luis Rojas, sobre el sistema de espionaje adquirido por el Gobierno. Pide transparencia y rendición de cuentas.

Fuente: Tedic rechaza afirmaciones del Gobierno sobre sistemas de espionaje


Senad asume compra de software para ubicar a personas – Paraguay.com

Paraguay: Meses atrás trascendió la información acerca de un software espía adquirido por el Gobierno. Desde la Senad asumen la compra, sin embargo aseguran que no sirve para vigilar sino solo para ubicar a las personas.

Fuente: Senad asume compra de software para ubicar a personas – Paraguay.com


Ejército alemán contará con una división contra ataques cibernéticos – El Mostrador

El Ejército alemán contará con una división encargada de combatir los ataques cibernéticos, anunció esta semana la ministra de Defensa Ursula von der Leyen.

Fuente: Ejército alemán contará con una división contra ataques cibernéticos – El Mostrador


Ron Wyden vows to filibuster anti-cryptography bill / Boing Boing

Senators Richard Burr [R-NC] and Dianne Feinstein [D-CA] finally introduced their long-rumored anti-crypto bill, which will ban US companies from making products with working cryptography, mandating that US-made products have some way to decrypt information without the user’s permission.

Fuente: Ron Wyden vows to filibuster anti-cryptography bill / Boing Boing


Reino Unido espía a los refugiados hackeando sus móviles y ordenadores

Los refugiados no tienen derechos. De ahí se deriva que sus teléfonos pueden ser hackeados y sus ordenadores también. Al parecer, esto es lo que ha hecho -legalmente y según The Observer – los funcionarios de la oficina de inmigración británica. En 2013 recibieron poderes para hackear los dispositivos electrónicos de todos los refugiados y peticionarios de asilo que considerasen necesario. Y lo consideran.

Fuente: Reino Unido espía a los refugiados hackeando sus móviles y ordenadores


The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos

SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to a document obtained by The Intercept.

Fuente: The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos


Forget Apple's fight with the FBI – our privacy catastrophe has only just begun | Technology | The Guardian

The privacy crisis is a disaster of our own making – and now the tech firms who gathered our data are trying to make money out of privacy

Fuente: Forget Apple’s fight with the FBI – our privacy catastrophe has only just begun | Technology | The Guardian


Exclusive: Snowden intelligence docs reveal UK spooks' malware checklist / Boing Boing

Boing Boing is proud to publish two original documents disclosed by Edward Snowden, in connection with “Sherlock Holmes and the Adventure of the Extraordinary Rendition,” a short story …

Fuente: Exclusive: Snowden intelligence docs reveal UK spooks’ malware checklist / Boing Boing


‘Trident is old technology’: the brave new world of cyber warfare | Technology | The Guardian

Forget debates about Britain’s nuclear deterrent. New technology means a country can be brought to its knees with the click of a mouse

Fuente: ‘Trident is old technology’: the brave new world of cyber warfare | Technology | The Guardian


Apple's Tim Cook defends encryption. When will other tech CEOs do so? | Trevor Timm | Opinion | The Guardian

More high-profile titans need to use their platforms to make crystal clear how important encryption is to users everywhere

Fuente: Apple’s Tim Cook defends encryption. When will other tech CEOs do so? | Trevor Timm | Opinion | The Guardian


Apple believes bill creates ‘key under doormat for bad guys’ – FT.com

Shortly after Theresa May introduced the draft Investigatory Powers bill in November to update the UK’s surveillance laws for the internet age, the home secretary met privately with Tim Cook, Apple’s chief executive. He laid out a number of

Fuente: Apple believes bill creates ‘key under doormat for bad guys’ – FT.com