• Critical Vulnerability and Privacy LoopHole Found in RoboForm Password Manager

    Unless you are a human supercomputer, remembering password is not so easy, and that too if you have a different password for each site. But luckily...
  • miniLock - Open Source File Encryption Tool from CryptoCat Developer

    It’s the age of surveillance what made the Use of Encryption so widely that it has become a need of law enforcement agencies, cyber criminals as...
  • A BEGINNERS GUIDE TO HACKING UNIX

      *************  *       A BEGINNERS GUIDE TO:        *  *        ...
  • CASH! CASH! Hacking ATM Machines with Just a Text Message

    As we reported earlier, Microsoft will stop supporting the Windows XP operating system after 8th April, apparently 95% of the world’s 3 million...
  • Microsoft Word Zero-Day Vulnerability is being exploited in the Wild

    Microsoft warned about a zero-day vulnerability in Microsoft Word that is being actively exploited in targeted attacks and discovered by the...
  • Snoopy Drone Can Hack Your Smartphones

    The use of unmanned aerial vehicles (UAVS) called Drones is rapidly transforming the way we go to war. Drones were once used for...
  • Android Privilege Escalation Flaws leave Billions of Devices vulnerable to Malware Infection

    Android - a widely used Smartphone platform offered by Google is once again suspected to affect its users with malicious software that puts...
  • Introduction to Netcat

    Introduction : So I was messing around on the internet and came across a tool called Netcat.  I've been messing with it for a couple of...
  • Google Nexus phone vulnerable to SMS-based DOS attack

    Google’s Nexus Smartphones are vulnerable to SMS-based DOS attack, where an attacker can force it to restart, freeze, or lose network...
  • Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP-CGI Vulnerability

    A Symantec researcher has discovered a new Linux worm, targeting machine-to-machine devices, and exploits a PHP vulnerability...

Thursday, 12 September 2013

NSA: Steve Jobs is the real Big Brother and iPhone buyers are zombies

As reported that, your Smartphone is a goldmine for the US National Security Agency (NSA), they have the full access to your Data available on your Smartphones including Android, iPhone and Blackberry.



But among other Smartphones, iPhone apparently is the most popular with the National Security Agency. Another NSA presentation leaked by NSA whistle-blower Edward Snowden and published by German paper Der Spiegel, describing Steve Jobs as the real Big Brother and iPhone buyers as the "zombies".



By cracking mobile operating systems and eavesdropping on mobile communications, the data obtained in this way includes contacts, call lists, SMS traffic, notes and location information.

"Such as a iPhone picture of a foreign government official who took selfies while watching TV, and a picture of an unknown man, apparently an Afghani fighter, in the mountains of Afghanistan. And remember the iPhone’s location bug? That enabled tracking of people over extended periods of time before being fixed by Apple in mid 2011."

In April 2011, the researchers discovered that Apple was storing the coordinates of every location iOS device owners into an unencrypted file.

One of the slide uses images from Apple's "1984" commercial, saying "Who knew in 1984... that this would be big brother... and the zombies would be paying customers?".
According to several documents, the NSA spent years trying to crack BlackBerry communications. Both Blackberry and Google denied that there was any backdoor access through apps or otherwise on their systems, nor did they allow governmental access through other means.

But one of the slides in the presentation titled “Your target is using a BlackBerry? Now what?” shows an email from a Mexican government agency which was sent using BlackBerry encryption technology, intercepted by the NSA nonetheless.
Der Spiegel has revealed that the agency is able to leverage so called backdoor access to infiltrate your computer remotely and decrypt the iPhone backup files created during each iTunes sync, injecting small scripts that enable additional access to at least 38 iPhone features.

Just hours before Apple takes the wrappers off of its latest flagship iPhone 5S, more rumors have surfaced about the device’s about the inclusion of a fingerprint scanner and The Wall Street Journal has all but confirmed the presence of this new feature.

Apple trying to introduce its new Fingerprint Reader technology as a security feature after the privacy fears have been heightened in recent weeks due to the NSA spying scandal, as well as the rise of fraud and hacking scams.Ironically, the fingerprint reader’s presence has raised new security fears. It is possible that, the NSA's next phase could be - collecting Fingerprint Scans of users without knowledge for biometric data or Intelligence data collection ?

2 comments:

  1. fuck NSA !!! always spying on us , give me back my privacy

    ReplyDelete