If you put enough time and effort, they say, you can tailor every Android phone to serve your unique interests and interface layout, and third-party launchers like Nova, Apex and the like, have proved it time and again. Every once in a while, a new launcher appears that promises a…
Apps and tools every Android power user should have on their device #2
Last week, we showed you some of the fundamental apps for Android power users. Just as we told you back then, pushing the limits of the OS with an app might sound like something “too good to be true” to the regular and uninitiated Android user, but with Android, anything…
This company sells spy tools to evil governments
Source: National Cyber Security – Produced By Gregory Evans We know dictatorships spy on innocent people. And now we know where they buy their tools — from a tiny Italian company in Milan. It’s called Hacking Team. And the world knows about it, because Hacking Team has been hacked. On…
CCS Police to Acquire State-of-the-art Tools
Source: National Cyber Security – Produced By Gregory Evans Powered by Max Banner Ads HYDERABAD: Soon, the city police will put a stop to its dependency on external agencies for want of sophisticated technology relating to cyber crime investigation. Be it banking and economic frauds, online stalking or even multi-level…
High-tech tools needed to fight modern human traffickers
Source: National Cyber Security – Produced By Gregory Evans For most Australians, it seems inconceivable that the miserable practice of human trafficking could still exist. And yet we learn that in recent years this terrible problem has actually been getting worse, not better. The trafficking process also often involves other…
NSA Hacking Tools Will Find Their Way to Criminals Eventually
he U.S. National Security Agency has reportedly developed technology to commandeer computers even when they are off the Internet, and security experts warn it’s only a matter of time before similar tools become part of cybercriminals’ toolbox. Since 2008, the NSA has used radio technology to send and receive data…
A few other privacy tools you may want to check out:
BitMessage is a decentralized, encrypted and peer-to-peer messenger. This program has seen a surge in popularity since the Snowden leaks. TorChat is an easy-to-use anonymous messenger designed to fit nicely into the Tor environment. It has been widely used across the Dark Net spectrum since before Tor Mail’s fall. Read…
Trojan Horses, Malware and Other Cyber Attack Tools are Just a Click Away
Trojan Horses, Malware and Other Cyber Attack Tools are Just a Click Away The Washington Post News Service with Bloomberg News (c) 2012, The Washington Post. Ryan Linn’s hacks into corporate networks have become almost a matter of routine. On one recent morning, he woke up at his home near…
Secret Service to procure Secure View 3 cell phone forensic tools
Jacob Goodwin Top Priority Sector: law_enforcement_first_responders Image Caption: Secure View 3′sLink View Graph The U.S. Secret Service plans to purchase the Secure View 3 mobile phone forensic investigative tool which enables a user to both access and analyze data found within a suspect’s cell phone. The Secret Service will also…
CBP buys Buster contraband detector and other inspection tools
Jacob Goodwin Top Priority Sector: cbrne_detection Image Caption: Buster contrabanddetection system U.S. Customs and Border Protection has awarded a total small business set-aside contract to Campbell Harris Security Equipment, of Alameda, CA, for the supply of one Buster contraband detection kit, as well as a variety of detection kits, fiberscopes,…