وجود نسخة من برنامج سايفون مدمجة مع برنامج خبيث
أكتشاف برنامج خبيث تم دمجه مع برنامج تجاوز الحجب سايفون ٣. البرنامج الخبيث يتواصل عند تشغيله مع خادم كبيوتر في سوريا.
Citizen Lab's latest research publications.
أكتشاف برنامج خبيث تم دمجه مع برنامج تجاوز الحجب سايفون ٣. البرنامج الخبيث يتواصل عند تشغيله مع خادم كبيوتر في سوريا.
In the past 24 hours The Citizen Lab has identified a maliciously repackaged copy of the popular circumvention software Psiphon 3. This post describes the malware and outlines steps to be taken.
As a follow-up to our post about the number of sites miscategorized by SmartFilter, our tests with Blue Coat show that miscategorization is not a problem limited to a single product. We should be skeptical of any company’s claims that they are able to categorize much of the web accurately, or that their rate of “collateral damage” is very low.
The Citizen Lab at the Munk School of Global Affairs, University of Toronto is one of ten non-profits in the U.S. and abroad to receive the New Digital Age Grants, funded through a $1 million donation by Google executive chairman Eric Schmidt and his wife, Wendy.
On January 20, 2014 the Citizen Lab along with leading Canadian academics and civil liberties groups asked Canadian telecommunications companies to reveal the extent to which they disclose information to state authorities. This post summarizes and analyzes the responses from the companies, and argues that the companies have done little to ultimately clarify their disclosure policies. We conclude by indicating the subsequent steps in this research project.
Our analysis traces Hacking Team’s Remote Control System’s (RCS) proxy chains, and finds that dedicated US-based servers are part of the RCS infrastructure implemented by the governments of Azerbaijan, Colombia, Ethiopia, Korea, Mexico, Morocco, Poland, Thailand, Uzbekistan, and the United Arab Emirates in their espionage and/or law enforcement operations.
This report outlines an extensive US nexus for a network of servers forming part of the collection infrastructure of Hacking Team’s Remote Control System. The network, which includes data centers across the US, is used to obscure government clients of Hacking Team. It is used by at least 10 countries ranging from Azerbaijan and Uzbekistan to Korea, Poland and Ethiopia. In addition we highlight an intriguing US-only Hacking Team circuit.
Citizen Lab’s Bill Marczak helped Privacy International scan Ethiopian refugee Tadesse Biru Kersmo’s computer, and they found traces that showed FinSpy had been operating in June 2012 over two days while he was in the UK.
Christopher Bronk, a senior fellow at the Canada Centre for Global Security Studies, has authored a report on cybersecurity threats to the US’s energy industry and infrastructure.
Citizen Lab is one of seven nonprofit organizations around the world to receive the 2014 MacArthur Award for Creative and Effective Institutions.